466
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Channeled Beneath International Law: Mapping Infrastructure and Regulatory Capture as Israeli–American Hegemonic Reinforcers in Palestine

, LLM, PhDORCID Icon
Pages 332-366 | Received 17 Oct 2023, Accepted 14 Mar 2024, Published online: 10 May 2024

Abstract

The United States is the most influential actor in the Israeli–Palestinian conflict; its intelligence agencies cooperate with Israel on most “counterterrorism” dossiers impacting Palestinians’ life, with a significant number thereof pertaining to Internet policing in Gaza and the West Bank. Meanwhile, Israel controls some of the key Internet service providers (ISPs) that serve Palestinians, and it is thus endowed with the capability to compel those ISPs to filter information so as to perform as American propaganda reinforcers. Moreover, the United States may unaccountably assert jurisdiction over data from and to Palestine because American cables are where most of the Internet transits through, exercising surveillance without judicial oversight. Verified instances of censorship directed by government-tied U.S. corporations, especially during confrontational seasons, are indeed numerous. Palestinian authorities themselves contribute to creating information clusters and identity bubbles, with infrastructural deficiencies as well as executive and court orders undermining freedom of expression online under arbitrary “public morals” or “security” concerns. The combined effect of technical advantage and regulatory capture supports the convergence of interests between Palestinian and Israeli authorities in restricting Palestinians’ digital rights, and assists the United States in reiterating its “security” hegemony in the region. This warrants a debunking of the limits of the law in constraining private actors and readjusting states’ jurisdiction over Internet infrastructure and data packets transiting through it.

Introduction

Data sovereignty is an infrastructure-intensive terrain of contestation for states and citizens alike.Footnote1 Everywhere in the world, but particularly in contended areas such as Palestine, Internet design and digital policies are regulated well beyond the law, with the latter coping with (or ignoring) infrastructure-level contingencies and related policy arrangements that make the law redundant or unserviceable for all those who are already targeted with and suffering from discrimination. Hegemons (be they prospective or actual) tend to make the most of this apparent misalignment between the Internet as infrastructure (network) and the Internet as flow of information (content), that is, of the purported insignificance or neutrality of the former for controlling the latter. This article explores this misalignment with reference to Palestine and, more specifically, from the normative, critical third-world perspective of the Palestinians. Nevertheless, prior to delving into the gist of this discussion, a few preliminary remarks are outstanding.

Sovereignty-wise, public Internet governance rests at the confluence of exercising authority over both data transmissions and the “hard structure” enabling them. This calls for two debates that are far too often addressed separately, as if the concerns they raised could be discussed independently. The first debate concerns the Internet as a channeler and propagator of ideas; in this respect, from the viewpoint of democratic societies, public interferences with the free flow of online information are justifiable only in a limited, regulated set of circumstances. There is a Western discourse that emphasizes the appointment of the state as a mere “guarantor” of the public order online, with no supplementary function other than upholding a vaguely defined no-harm approach to online communications. This is ordinarily phrased along the lines of “digital constitutionalism.”Footnote2 Yet because the “geopolitical West” has repeatedly failed to deliver on this premise (and promise) both in-house and abroad,Footnote3 often disguising cyber-surveillance as “security” and “counterterrorism,”Footnote4 governmental agencies at multiple levels have increasingly felt legitimized to overstep their original mandate, up to eventually policing the Internet—overtly or surreptitiously, also depending on the democratic or nondemocratic nature of the state concerned.Footnote5 The second debate concerns the materiality of the Internet, that is, its infrastructural underpinnings; while it is widely ascertained that states may control mentioned infrastructure to filter communications in and out,Footnote6 how infrastructural control shapes the production of online content and the legal and policy stances toward the moderation thereof is severely understudied,Footnote7 especially in context of “borderline statehood”—so to write. In those contexts, infrastructural control and immediate legislative prerogatives over online content may not fall with the same authorities, or even within the same state. There, online and offline authority over the Internet, just like territorial and communication sovereignty, may not perfectly coincide. To make everything more complicated, the asymmetries are exploited by foreign or domestic private parties that de facto or de jure enforce “public authority” of dubious legal standing and fragmented policy mandate.Footnote8 To a largely misappreciated extent, it is the “materiality” of Internet networks that enables or augments the surveillance, censorship, and distortion of online contents.

As for the Internet’s material structure, it may be explained as follows:

It starts at the “bottom” with the physical layer (telephone line, coaxial cable, fibre, wireless, etc.), and then a logical layer consisting of transport protocols (TCP/IP, HTTP) that define how messages are encoded and transported online. Above this is the application layer that defines how the network is used (e.g., search, social networks, websites), and at the top of the stack is the content layer (text, speech, image, video, music, telemetry), which is the actual information that is conveyed by the Internet.Footnote9

The present work expounds how the first (infrastructure) and second (appliances) layers are controlled to surveil the third (applications) and ultimately fourth (contents) ones. The reader is advised to appreciate that the reasoning provided hereinafter is based on cable-channeled Internet, while the Internet might start being delivered through satellites in the near future—a revolution that would call for a reexamination of some of the key tenets illustrated here. For the time being, a few (private) satellites are already being deployed to foster Internet connectivity (most notoriously over Ukraine and Gaza upon their invasion by Russia and Israel, respectively),Footnote10 but the large-scale, public implementation of these technologies for civilian purposes has a long way to go.

Be they Internet service providers (ISPs), social media, or institutions, all these agents (and several state and nonstate others, as we described in the following) contribute their fair share toward the daily “weaponization”—so to speak—of the Palestinian cyberspace as a public agora, to its occupation and militarization. This is not to say that the present work is concerned with social-media skirmishes conducted for “perception management”Footnote11; nor is it premised to investigate manifestations of information warfare in PalestineFootnote12 per se. Rather, this article seeks to address the following three—interrelated—research questions: (1) Why can Palestine’s neglected cyber sovereignty be technically characterized as U.S.–Israeli meddling by proxy? (2) In what ways does this protracted impairment affect Palestinians’ life? (3) How do cyber censorship and surveillance become hybrid tools to perpetuate, extend, and legally substantiate more traditional means of political violence? These three questions are not examined one by one; instead, they are answered in a coherent whole as this article progresses, leading to the (admittedly quite tentative) policy suggestions formulated in the final section. The purpose of the present investigation is thus to justify the formulation of just-mentioned policy proposals, as well as to debunk the salience of (captured) infrastructural arrangements for which the policy momentum far outshines regulatory and legislative efforts in the Internet realm.

Prior to delving into Palestine, one more note is due. The reason why this article addresses the three research questions together, as opposed to dealing with each of them in turn, is that the material is deliberately organized in such a manner to coherently lead to overall policy proposals that are centered inter alia around content moderation, despite the article’s originality contribution not resting with content moderation per se. Turning to the three questions one by one would have perhaps reinforced expectations to find policy proposal equally addressing each problem in a silos. Instead, while the proposals are articulated around regulatory issues, especially content moderation, the root of those issues is to be traced to the network–content relationship, which is underproblematized and represents the gist of this article’s contribution. The gist of this article is the role of Internet infrastructure (or “architecture”) and “degrees of sovereignty” thereon in shaping online surveillance, regulatory capture, and ultimately content-moderation regulations and practices. As the article clarifies, the degree of sovereignty on Internet infrastructure could not be more momentous for content moderation, and in contexts where addressing sovereignty would prove merely idealistic, regulating content moderation to account for sovereignty constraints is one of the ways to minimize the violation of users’ rights and promote their online and offline emancipation. When Internet sovereignty is weak, authorities tend to pursue undue ideological alignment and “stance leveling” with the occupying, dominant, and/or hegemonic power, which tends to co-provide Internet services and surveil their operations. This increased scope for surveillance and preventative censorship, as well as for intelligence supply, calls for user mistrust and self-censorship, fostering a “chilling effect” that will have repercussions on their collective identity and communications, and thus emancipation, as an offline community as well. In turn, if users (and citizens) understand that their authorities are not sovereign over their Internet policing and infrastructure, but rather colluded with foreign powers and regulatory capture by their corporate entities, they will not conform to such authorities’ directives and will eventually turn the Internet to a terrain for anonymized contestation, rebellion, and violent rhetoric. These risks, and especially their root causes, must be accounted for when it comes to content moderation, in such a way that the latter is not perceived as “biased” or “one-sided” by the most disadvantaged users who belonging to the most “unsovereign” territories. The focus here, however, is on the root causes; content moderation only features in the policy proposals, right before the Conclusion.

Unneutral Digital Colonialism in Palestine

Since the 1970s, Israel and Palestine have—initially unintentionally—positioned themselves as the natural laboratory for digital cartographers due to their precariously compenetrating sovereign and unsovereign spaces, “withouts” and “withins.”Footnote13 Lindtner et al. compellingly observed that “maps can be crucial for survival, not just for finding the nearest Starbucks.”Footnote14 Indeed, digital struggles fall within the portfolio of acts of resistance against “the violence of police power and the criminalization of poverty and protest” that characterize what has been termed “the Anthropocene or the Capitalocene”: the era where the “burdens of solving precarity too often fall on those who are already the most precarious.”Footnote15 In this context, they posit,

Digital infrastructures, from fiber optics to communications platforms, are run on dispossession, genocide, forced relocation, and extraction. Local communities have responded by “bootstrapping” digital infrastructure. Rather than owning the means of production directly, appropriating the means of mediation has become a way to control the lifeblood of commodity circulation.

A parallel can be drawn to more traditional infrastructure policies. Dugard and Reynolds recall that in the West Bank,

The separate road system[, …] central to its territorial fragmentation and distinctly evocative of a sense of apartheid despite the absence of an equivalent in the South African context, evolved in the planning and construction realm as a prop for broader segregationist policies without a legislative foundation.Footnote16

Equally unlegislated about, and yet effective, is the private rule of online mapping services that only show itineraries suitable for the Israelis. An infamous exemplification is the one reported by Al Jazeera five years agoFootnote17: Not only did Google Maps align to the United States’ nonrecognition of Palestinian statehood (which is manifestly hegemonic, but only of moderate practical significance for the app’s users); more concretely, Google Maps pointed both Palestinians and Israelis to roads that were in fact used by Israelis only, and that for security reasons should not have been traversed by Palestinians. This fact not only contributed to minor incidents; it also reinforced an identity narrative according to which the Israeli viewpoint comes forward, while the other one embodies “the rest,” “the alternative,” the minority one, even where Palestinians represent the overwhelming majority of citizens and users. Most recently, Google Maps and Waze apps reportedly decided to accommodate a request by the Israel Defense Forces to turn off their real-time traffic data feature in order to prevent the disclosure of information that could help track the planning and execution of the Gaza invasion.Footnote18

The Google Maps saga situates itself on the plane of digital contents, but even before entering such level of analysis, issues of technological segregation in Palestine lie with its infrastructure. For instance, checkpoints between Israel and the Occupied Palestinian Territories (OPT) are placed under Israeli military authority and, on the civilian side, under the administration of the Director-General of the Public Administration of the Crossing Points and Borders, who is also endowed with the authority to “define the developmental needs on the level of infrastructure, modern equipment and tools, and the security requirements” as well as to “define the needs required from international parties, especially in the field of technical expertise.”Footnote19 Against this backdrop, the problem does not rest itself solely on the fact that in mobility apps certain roads are privileged over others or certain checkpoints are not displayed, and so forth; rather, it is more about the fact that out of political will, around those very same checkpoints no phone-line coverage for Palestinian telecom operators is allowed. The result is that exactly where most human-rights abuses are committed, power imbalance manifests itself starting at the infrastructural levelFootnote20 and propagates therefrom, originating a telling mismatch between political and infrastructural boundaries.Footnote21

While the Internet is often discussed about as if it were a neutral commons, Cristiano reminds us that

broadband diffusion […] tends to follow profit dynamics, as much as […] infrastructural ownership […] regulate[s the] access to cyberspace (the “square”) and thus compromise[s] the extent [to] which political freedoms online are to be enabled collectively, and for the collectivity.Footnote22

This struggle is hardly more obvious anywhere else than in the OPT, which is why “strengthen[ing] Palestine’s cyber security and ensur[ing] the [Information and Communication Technology (ICT)] sector’s freedom from external threats and domination” feature in the Sustainable Development Goals (SDGs) plan of Palestine.Footnote23 One could be tempted to assume that in such a vulnerable, subjugated territory as the OPT, whose issues range from food security to the detention of children, framing ICT within principled and aspirational manifestos such as the SDGs features at the bottom of the agenda. In fact, it is quite the reverse: Supporting international discourses around digital rights, however phrased, is crucial in a territory where Israeli authorities can (and do) suppress opposition and protest by censoring or disconnecting Internet networks. Hence, mentioned inclusion in their SDGs plan cannot come as surprising: “The Palestinian network is in reality nothing but a sub-network of the Israeli network, and Palestinian ISPs are in practice retailers for Israeli ISPs.”Footnote24 Market-wise, as illustrated in an infographic released by the Visualizing Palestine project,Footnote25 Palestinians pay more to receive less compared to their Israeli counterparts. Discriminating against Palestinians through what is supposed to be “their own” market and economic infrastructure has long been a constant in technology policing, both before and after the Internet. In fact,

alongside the desire to integrate West Bank Palestinians into the Israeli economy, there was a simultaneous desire to exclude these same people in the name of Israeli “security”. It is the tension between these two processes that creates the border regime.Footnote26

Nonetheless, Internet penetration per se is the least concerning among all technology-related problems for Palestinians,Footnote27 whose access-to-Internet statistics were extremely poor two decades agoFootnote28 but have improved rapidly, up to standing now in line with those of other jurisdictions in the Middle East and North Africa (MENA) region.Footnote29 What may alarm one instead is the overt or hidden control on such Internet, which includes surveillance and subsequent extortion and blackmailing related to digital content, exercised both within and beyond the law.Footnote30 Some of these “law-enforcement” techniques are operated in a legal gray area domestically, meaning that they are neither provided for in (any) domestic law nor ruled out as unlawful under the same regime(s). However, under international law—thus, primarily pursuant to the International Covenant on Civil and Political Rights (ICCPR), to which Israel has been a party since 1991, and related nonbinding yet highly authoritative General Comment by the United Nations (UN) Human Rights Committee (HRCttee)—any gray area privacy-wise verges toward unlawfulness. Scholars reasoned that

ICCPR Article 17 prohibits two forms of interference with privacy: “unlawful” interference and “arbitrary” interference. […] Absent affirmative authorization by a [S]tate’s legislation, which in turn must comport with the ICCPR, interference with an individual’s right to privacy is therefore prohibited. Additionally, […] the domestic law authorizing such interference must be both reasonably foreseeable to the person concerned as well as precise and clearly defined. […] Intelligence surveillance of civilians who are not participating in hostilities […] is neither reasonable nor proportional and should therefore be deemed arbitrary […] Assuming, arguendo, the viability of the declared state of public emergency in Israel, these practices would remain violations. While intelligence collection and the infringement of privacy in certain cases may well be protected under Article 4 [ICCPR], even by its own terms, permissible infringement is limited to what is “strictly required.” […] These civilians are being targeted […] simply because they are Palestinians residing in the OPT, without any cause to believe that they are involved in military or terrorist activity. […] [Importantly], the ICCPR should be found to apply extraterritorially at least insofar as it restricts Israeli action in the OPT.Footnote31

Furthermore, it shall be noted that while Israel has attached a reservation to Article 23 ICCPR, it has not expressed any objection to Articles 4, 17, or others.

Along the lines of what the International Court of Justice (ICJ) authoritatively advised in its Wall Advisory Opinion,Footnote32 the preceding demonstrates that unreasonable surveillance conducted by Israel in the OPT is unlawful under international law. Indeed, it has long been recognized, also from the perspective of international human rights law (IHRL), that Internet access alone is meaningless when not complemented by a set of digital rights.Footnote33 Worse even, Internet access per se, which is consistently touted as a self-standing human right due to its supposed merits as an enabler of emancipation, might in fact turn into yet another instrument in autocrats’ (or, in this case, occupiers’) policy toolset aimed at denying individuals their fundamental rights and freedoms of thought, opinion, speech, association, and so forth.Footnote34 This necessary complementarity is mirrored in content-moderation practices, particularly relevant for social-media platforms. After all, the delusion with Palestine is not visibility, but what is being made visible,Footnote35 so that a human-rights approach—underpinned by the principles of legality, legitimacy, and necessity—to said content moderation,Footnote36 despite its foreseeable pitfalls,Footnote37 is warranted.Footnote38 Such an approach would help rebalance the conjecture that “content moderators endeavor to apply the same set [of] rules to [e.g.] Facebook’s 2.3 billion monthly users around the world regardless of social or political context”Footnote39 with more culturally proximate, “indigenous,” and context-sensitive considerations of language and customs informed by historical roots as much as actual on-the-ground, daily-life contingency.

Besides social-media platforms, ISPs are—as mentioned earlier—another agent for potential Internet censorship, contributing to degrading users’ digital rights in Palestine. This follows a global trend whereby “sometimes unknowingly, sometimes reluctantly, sometimes willingly, [private Internet intermediaries] have provided key infrastructure for monitoring and analysing citizens’ communication activities,”Footnote40 a practice that is even graver here as those private actors belong or report to an occupying sovereign entity (Israel). Nonetheless, it shall be emphasized that the trend is Western, too; there is indeed little of non-Western in the “colonial ideology that situates Israel as an outpost of the West”Footnote41: the “colonial concerns about challenges to settler domination are all filtered through a racial discourse that identifies Palestinians, Arabs, and Muslims as the sources of violence and instability,” and are channeled through the Internet as well. In this sense, the Internet stands as a means by which the crime of apartheid as understood under public international law is committed: In the wake of Israeli as well as international doctrinal investigations having already concluded that the stigma of apartheid can be attached to the way Israel exercises its military rule over the non-Israeli Palestinians as far as international law is concerned,Footnote42 one can identify with the Israeli management of and control over Palestine’s Internet all the elements that characterize said apartheid more generally, including discrimination, neglection of self-determination, settler colonialism,Footnote43 and the systematic oppression more and more embedded within institutions as generations take turns.

In Palestine, these tendencies have been worsening rather than relaxing, following—one may suppose—a global trend to the same effect.Footnote44 While the common imaginary is filled with early-days infrastructure-neutral assumption about online communication, reality is that the Internet architecture has been gradually reconfigured to secure “the prioritization of corporate interests over the interests of end users.”Footnote45 And whereever (digital) sovereignty is weak, authorities more easily defer to the commercial interests and strategic projections of foreign providers and their states of incorporation. For this reason, while the Internet is charged with a special connotation in Palestine as a much-needed digital replacement for physical mobility and affectionFootnote46 for which the long-standing removal has been normalized and institutionalized, I believe this study may hold wider significance for all other territories that do not enjoy their own sovereign Internet, either because they are militarily occupied or owing to any other technical or socioeconomic reasons. As the regulatory grip on digital infrastructure and content tightens across most world region, and with instances of contested statehood and state–nation asymmetry arguably on the increase, this resonates and holds relevance well beyond Palestine. In fact, at times it is the “state” that finds itself “unsovereign” over the local Internet, and at other times it is the “nation” (intended here as civilization, polity, identity-homogeneous populace) to feel “expropriated,” either because that nation’s “related” state controls the Internet on their behalf, or because the cross-border configuration of such nationFootnote47 is not backed by an equally cross-border national Internet, which is rather segmented across different state sovereignties. For instance, Aouragh illustrates how

Palestinians have not only been exiled because of their political engagement or ideological stance, but mainly because they were expelled under a settler-colonialist project and a continuous context of forced land appropriation. This […] strengthens the importance of “return” as an alternative; also of a virtual return to the homeland. The expression of national identity through online encounters is more poignant in the context of the actual loss of land, and in that of being confronted by a colonial other. [… Indeed, not only m]ost exiled Palestinians do not feel less Palestinian because they are not present on Palestinian soil; rather, they share an imagined community with other Palestinians inside and outside the territorial centre, while simultaneously considering historical Palestine a very important point of reference.Footnote48

The peculiarity of their situation originates from their condition as “outsiders” being also a perennially potential status that might materialize almost any time, depending for instance on the pace and brutality of the expansion of the illegal-settlements project. Indeed, as is widely known, what remain of Palestine today are microfragments of land scattered across the West Bank (plus a slice of territory in Gaza, currently being evacuated and bombed), rather than a continuous portion of land linking all major Palestinian urban settlements at least.Footnote49

And yet, Palestine is a context of constant battling that far exceeds civilian oppression; if the “reorganisation of the global urban terrain, through a series of micro tactical actions, strives to re-imagine the city not only as the site, but also the very medium of warfare,”Footnote50 then the quasi-militarized “occupation” of cyber infrastructure is certainly a component of said medium for permanent, low-intensity engagement. When misguidedly deployed and rhetorically misappropriated by power politics, “connectivity” may also symbolise the ultimate hypocrisy of a ruthless engine of necropolitical crushing; this trend only exacerbated with Internet availability, while actually starting with phones.Footnote51 Nearly a decade ago, Zureik offered a vivid description of this necropolitics exercise in the Gaza Strip:

As evidence of its attempts to spare Palestinian lives, Israel does not hesitate to mention the recorded messages, or so-called “roof knocks,” that it sends to Palestinians whose homes and neighbourhoods are about to be bombed. These phone numbers are gathered by Israeli intelligence, and although the targeted Palestinians are given five minutes to vacate their homes, it is not clear where they are supposed to vacate to since Gaza’s high-density housing leaves no room for escape.Footnote52

This represents the disembodiment of law from technology, the dissociation between what legal frameworks—international humanitarian law (IHL), in this case—prescribe and their most farcical manipulation and cynical distortion, as endorsed by self-legitimizing military lawyering jargon.Footnote53

Taking stock from all aforementioned insights, I next attempt to answer the three questions I introduced earlier. To do so, unmissable companionship will be found in a few sources that, among all others, proved to be of the highest significance for the subject of my study. These are first the empirical report by the 7amleh organization,Footnote54 a summary thereof having been provided by Peoples Dispatch.Footnote55 No less importantly, excellent ethnographic work was conducted by Aouragh across several outletsFootnote56 and intellectually salient contributions came from Tawil-SouriFootnote57; these two scholars also worked proficiently and published together.Footnote58

Nonsovereign Infrastructure

More than 90 per cent of both groups thought that outsiders monitored information traffic over the Internet, and when asked to name who these outsiders were, 50 per cent of city dwellers cited the Israeli government and its security agencies; 20 per cent cited the United States, including the [Central Intelligence Agency (CIA)]; and 30 per cent mentioned both the [US] and Israel. Among camp dwellers, […] 73 per cent cited the Israeli government, and the responses of the remaining 27 per cent were distributed evenly, at 9 per cent each, among the US, Israel and the [US], and Israel and official Palestinian institutions.Footnote59

When it comes to both Israel’s domestic market and information and communication technologies (ICT)-focused negotiations in international fora, the telecommunications sector has historically been held in high regard by Israeli policymakersFootnote60 as a foundational component of their statecraft, as well as of their projected identity in the Middle Eastern region and the globe. More specifically, Israel invested considerably in cyberdefense,Footnote61 that is, in securitizing its cyberspace,Footnote62 but it is also one of the very first and few states worldwide to maintain a manifestly offensive cyber unit within its regular army.Footnote63 Meanwhile, Israeli companies (including hundreds of startups) specialized in the high-tech surveillance industry,Footnote64 with the NSO Group featuring among the world’s top sellers of spying software for digital warfareFootnote65 and Verint having been turned into a U.S. company just for tax-minimization purposes,Footnote66 while remaining essentially subservient to Israel’s political interests. This is far from an isolated incident. Tellingly, Israel has one of the three global clusters of cybersecurity firms (the remaining two clusters being American).Footnote67

The prioritization of this innovation sector over others, and the revolving doors connecting the Israeli and U.S. cybertech industries, are not a coincidence: They manifest the web of formal and informal Israeli–American ties in the (cyber-)defense field, crafted under the “securitization” manifesto. In 2022, the Israel–US Binational Industrial Research and Development (BIRD) Foundation, funded by the Department of Homeland Security (DHS) Science and Technology Directorate (S&T), launched the “BIRD Cyber” initiative in partnership with the Israel National Cyber Directorate (INCD).Footnote68 This is an outstandingly privileged relationship that intends to advance the cybersecurity of American interests and objectives in the Middle East. After all, in October 2023 the U.S. International Trade Administration confirmed it deems “Israel’s telecommunication network [to be] one of the most sophisticated in the world”Footnote69—also thanks to U.S.-supplied, U.S.-trained, U.S.-funded, and U.S.-overseen cyberdefense, surveillance, censorship, and offense capabilities.Footnote70 Aside from the commercial and military benefits for technology vendors and armies’ cyber units, the U.S.–Israeli cyber ties are potentially aimed at converging around the same approach to global Internet governance, not least at the UN levelFootnote71; they are also supportive of a broader bilateral “High-Level Dialogue” to “manage risks to [their] respective technology ecosystems,” supposedly premised to “promote […] democratic principles, and human rights.”Footnote72 The United States “has been highly impressed by the progress of the Israeli cyber community, learning its path, listening to its cyber leaders, and adhering to their vision,”Footnote73 to such an extent that Israeli scholars frequently propose their country’s cyberdevelopment as a best practice or even a role model for the United States to replicate on a larger scale.Footnote74

Besides Germany, but still arguably in an attempt to clear their sense of guilt and remedy to their historical wrongs, the most persistent Israeli allies in the geopolitical chessboard are the United Kingdom (UK)Footnote75 and the United States; in this sense, these three jurisdictions (Israel, the UK, and the United States) broadly conform to the canons of an “international clientelistic network” as defined by international relations (IR) scholars.Footnote76 Al-Jazeera, sympathetic to the Palestinian nationalist cause and initially hailed as a beacon of journalistic freedom in the region, was later dismissed as a terrorist-affiliated media outlet by influential American (and Western generally) media tycoons as well as political leaders,Footnote77 so that its Palestinian coverage, too, fell out off the radar in the West through a process of “socialization of value bias.”

From “high politics” to several diplomatic dossiers and, of course, the all-comprehensive and much trendy label of “counterterrorism,” intelligence cooperation has grown steadily between Israel and the United States,Footnote78 showing no signs of abating; the same holds true between their armed forces,Footnote79 police,Footnote80 and law-enforcement agencies generally. If “the US military has widely imitated the experience, technology and doctrine of Israeli forces in tailoring itself to the challenges of urban colonial and counter-insurgency warfare,”Footnote81 it is also salient to explore the way Internet infrastructure has become a component of this urban warfare, and the reason why the U.S. sovereignty over its Internet and indirect de facto control over a major part of the global network matter to Israel in this respect, despite geographical nonproximity.

In fact, provided the “counterterrorist” goals of both the United States and Israel are indeed those “to entrench their sovereign power against a generalized, demonized enemy whose geopolitical claims are radically delegitimized and whose subhuman, monster-like status means that political negotiations will never be necessary,”Footnote82 then those goals can be pursued through the techno-infrastructural (and only later, if needed, legal) control of the Internet, too. This triggers a bundle of choices investing not only bilateral business and politics, but also the crafting of a coherent, almost “coordinated” legal patronage to certain practices that transcend the offline reality to encompass the online “delegitimization” of the Other. On a slightly lighter note, this might also help explain why, differently from the Arab Springs in Tunisia and Egypt, which were supported by FacebookFootnote83 (as well as—very explicitly—by the United States), the same support faded with regard to the subsequent uprisings in Palestine, with Israel requesting Facebook to shut down pro-Palestinian pages, and Facebook subserviently complying.Footnote84 That was no surprise though, not even at a more systemic level: “Facebook has allowed major abuses of its platform in poor, small and non-western countries in order to prioritize addressing abuses that attract media attention or affect the US and other wealthy countries.”Footnote85

Even in the Middle Eastern regional context, Palestine is a special case (in the negative) with reference to exercising control over its Internet policing and infrastructure: Any other polity (or “nation”—think, e.g., of the Kurds) does have a state to rely upon for connectivity matters, and by which it is not proactively discriminated against—they are at worst surveiled, but conditions allow for appreciable degrees of resistance.Footnote86 Indeed, Internet discrimination is far easier when the minority polity, which is “alternative” to the one that forms the majority in the given state, is confined to a certain “space” within the state’s borders and factually segregated there with little to no chance of territorial mobility. The aforementioned ghettoization of the Palestinians makes discriminating them fairly viable on the side of Internet infrastructure—of course, jointly with relevant policies that “legalize” such discrimination post factum, often citing “emergency” and “exception” as a legal basis. To compare, the neighboring Jordan enjoys an extensive fibre-optic networkFootnote87 as part of an ownership-wise globally interconnected information technology (IT) sectorFootnote88 that Palestine could have made recourse to—entering into a bilateral agreement with the managers thereof as well as Jordanian state leaders—had it been fully endowed with statehood (and thus autonomous legal personality) under international law, and especially had it not been cybercolonized by Israeli technologies (i.e., devices plus infrastructure) and policy restrictions.

Internet infrastructure was once deemed to be a neutral means for communication—so much that it was originally conceived and engineered with an eye to practical arrangements, without much overthinking—and yet it has taken on additional meanings over time, including that of channeling censorship, that is, a new locus of special collaboration between private parties and public authorities.Footnote89 In Palestine, it was once believed that the Internet was not involved in the censorship activities pursued by Israeli authorities; relatedly, it was arguedFootnote90 that only offline measures were implemented to surveil Palestinians. Hence, to what do we owe this change of gear? To begin with, it is important to specify that Israel does not pursue censorship against Palestinians in Palestine only, and not even exclusively against Palestinians.Footnote91 In fact, under the customary pretext of “security” or, more precisely, “counterterrorism,” the Israeli Army has compelled the removal of social-media contents “from within” Israel to Israeli citizens as well,Footnote92 although one may argue that this is still a form of Palestine-related censorship in that it seeks to remove any criticism of military operations,Footnote93 most of which pertain indeed to the OPT.

Most remarkably, however, one shall note that the censorship against Palestinians is not operated by Israel only, but also—or even primarily—by Palestinian authorities themselves (although one may argue that it is the same as to say that Israel operates it both directly and, in the latter case, by institutional proxy). For instance, Palestine

ordered the ISPs to block at least twelve websites and Facebook application which had a relationship with the rival group Hamas. This is because the [latter] group controlled the Gaza strip. Also, the authority blocked every website that criticized the Fatah leader such as the ytnews.com and the middleeastmonitor.com.Footnote94

What is more, Palestinian journalists are routinely arrested by the Palestinian Authority (PA),Footnote95 and even Israeli journalists reporting from Gaza and the West Bank face condemnation in Israel when they criticise Israeli authorities, regardless of the fact that they simultaneously criticize the PA even about the same occurrences; although this might surprise some,Footnote96 it actually stands as an accurate representation of the PA being wholly regulatorily captured by Israel.

The considerations just described support the claim that “the Palestinian Authority has moved away from [its original] liberatory model to a neoliberal capitalist governance structure and has become a security subcontractor for the Israeli settler colonial state.”Footnote97 This is echoed by Tawil-Souri and Aouragh,Footnote98 as well as by RahmanFootnote99; Clarno, too, asserted that

the Israeli military and the PA security forces now work together to suppress Palestinian resistance and enforce order in the West Bank enclaves. [One shall in fact] trace the genealogy of security coordination under Oslo to explain the emergence of an advanced network of security agencies—including forces of the US empire and segments of the colonized Palestinian population—that prioritizes the security of Israel.Footnote100

Indeed, even the much-emphasized privatization of the telecom sector did not entail actual market competition, let alone people’s empowerment or independence. Quite to the reverse, Aouragh recalls that

private investors such as PalNet had set-up [ISPs] and were offering Internet services even before PalTel coordinated the infrastructure [… T]hey were licensed by the Israeli civil administration, and tapping from Israeli IT companies. Thus, when the PA was installed after Oslo and PalTel was given telecom/infrastructure monopoly, the status of ISP companies like PalNet with license to roam via Israeli providers into the OT was unclear. [… I]t soon] became clear that ultimately, all providers (including PalTel) buy their Internet lines through Israeli companies like Bezeq. […] The “occupied state” had to tap from its occupier in order to provide connection for what is still referred to as an independent communication infrastructure. It confirms that Palestinians were never offered real independence via Oslo […]. The Palestinian ICT phenomenon confirms that an “artificial” peace sparked the uprising because many of the peaceful agreements led to further lack of Palestinian independence. […] In other words, Palestinians developed a “survival economy.”Footnote101

In truth, this is a long journey that started with Arafat assigning telecommunication services to multiple foreign companies at once, due to cross-checking paranoia arising from his mistrust for his own fellow Palestinians.Footnote102 Nevertheless, the takeaway point is that with the Oslo accords,

Parts of social and economic life that were formerly common, noncommodified, and largely outside the realm of control and surveillance were turned into private and surveillable possessions under a new property regime limiting free (meaning both sovereign and not paid for) mobility.Footnote103

Beyond international agreements, the law plays a pivotal role in censoring Palestinians at the domestic level, too, exposing the precarious “sovereignty” of today’s Palestine. A wide array of Israeli laws are relevant to this effect,Footnote104 and while a thorough analyses thereof is unwarranted here, what matters the most for the sake of the present study is to emphasize how dependent those laws are on the constant rhetoric of threat, insecurity, and vulnerabilityFootnote105 that shaped Israel’s contemporary self-portrait. Surveillance extends far beyond the InternetFootnote106 and entails chilling effects of “self-censorship, including on the Internet, to avoid litigation” as provided in the Boycott Law.Footnote107 Chilling effect are indeed pervasive also offline,Footnote108 although the on/off distinction usually maintained in literature is nuanced by the fact that offline surveillance can trigger immediate reactions after being shared online In real time by the surveiling party with colluded authorities—not rarely in exchange for bribes.

It is when one considers Palestinian laws themselves, however, that the perverse legalistic effects of Palestine’s quasi-sovereignty as formalized subservience become strident. For instance, “the Palestinian Cybercrimes Law was referenced by several civil society organisations as the basis for arbitrary restrictions on the freedom of expression”Footnote109 in the context of the demonstrations that “took place in the West Bank on 13 June 2018 as part of the “Lift the Sanctions” campaign, organized by various Palestinian civil society actors calling for the lifting of the Palestinian Authority’s punitive measures on Gaza.”Footnote110 Interestingly, the offline tactics employed by the PA proved not dissimilar to—and at times equal to—those routinely resorted to by Israel, including the extemporary searching of social media accounts and related extraction and/or removal of audiovideo content.Footnote111 Israel indeed avails itself of this on-spot “street form” of censorship as a complement to the one—significantly more sophisticated and large-scale, as also recounted by CristianoFootnote112—operated directly on the Internet and its (para-)corporate stakeholders. All in all,

From the controversial Israeli Facebook bill that facilitates the shutdown of Palestinian social media pages to legislation that criminalizes filming Israeli soldiers, the digital sphere is far from being a safe space for Palestinian free expression. With the issue of cybercrime law no. (16), a key concern has been the role it could play in deepening Israeli surveillance considering the PA’s widely controversial commitment to security coordination with Israeli security units. [… Despite amendments,] several other concerns, highlighted in the original version law no. (16), related to excessive powers, and illegal collection of evidence remained unchanged in the 2018 law. Additionally, Article 40 in law no. (16) granting power to block websites remained as Article 39 in law no. (10).Footnote113

The laws are obviously intertangled with—and somehow dependent on—the way the Internet functions from a more technical perspective, with captured policymakers serving exogenous interests by upholding seemingly technology-neutral stances that conceal, in fact, a precise political plan. Their choices pertain to the storage, intermediation, and transfer of data, ultimately questioning the meaning and extent of “data sovereignty” and its neo-colonialities, as investigated by critical-data-studies researchers belonging to, inter alia, the socio-technical systems theory, the critical theory of technology, and as—perhaps most famously—science and technology studies.Footnote114 Some of these are in fact critical legal scholars,Footnote115 not least from or focusing on the Middle East.Footnote116

Even if one leaves the unaccountability of platforms’ servers situated within the U.S. jurisdiction and the potential complicity of their corporate owners with the U.S. government aside, a too-often-overlooked paradigm of neocoloniality lies with the actual functioning of the global Internet, which places them factually under U.S. law, too. While most scholarly literature has focused on the more exterior manifestations of the American influence on Israel’s telecommunications, only few works have examined the repercussions of U.S. hegemony over the global Internet on the narratives it construes about itself amid Palestinians. The United States has been deploying its online supremacy as yet another tool to segregate Palestinian voices and suppress dissent against Israel, not rarely assisted by “unaware” Palestinian authorities in accomplishing its intended results. Most of today’s global Internet communications are still routed through the United States because of the latter’s extensive cable and server infrastructure, which also means that U.S. authorities have enjoyed, over the last two decades, wide discretion in accessing sensitive data pertaining to Palestinians under the rubric of counterterrorism operations or general intelligence cooperation with Israel.

This data oversight was enabled by the technical functioning of the Internet, meaning it reflects not just Internet governance as a policy framework, but the nonhierarchical way the Internet works engineering-wise.Footnote117 The fact that the Internet channels communications through the most efficient route internationally rather than through the shortest or the domestic one,Footnote118 coupled with the quasi-legal intelligence prerogatives of the National Security Agency (NSA) and other Five-Eyes security agencies, makes it highly probable that most Palestinian communications at some point transit through cables the United States can assert jurisdiction over.Footnote119 Granted, data packets travel the Internet mostly encrypted, but this is no safeguard against lawless intrusion for all those world powers that enjoy the technical and political means to assert jurisdiction over Internet cables. In fact,

[intelligence] agencies […] have adopted a battery of methods in their systematic and ongoing assault on what they see as one of the biggest threats to their ability to access huge swathes of internet traffic—“the use of ubiquitous encryption across the internet”. Those methods include covert measures to ensure NSA control over setting of international encryption standards, the use of supercomputers to break encryption with “brute force,” and—the most closely guarded secret of all—collaboration with technology companies and internet service providers themselves. Through these covert partnerships, the agencies have inserted secret vulnerabilities—known as backdoors or trapdoors—into commercial encryption software.Footnote120

Besides this, the United States operates at a quasi-governmental level, too, when public–private revolving doors and widespread regulatory capture afford governmental agencies the means to direct business decisions by tech giants like Google and, vice versa, the latter to shape the strategies and political priorities of the government.Footnote121 This sounds like a negligible, indirect process, yet its repercussions on Palestinians’ daily life, collective identity, and digital rights cannot be dismissed.

While the U.S. scrutiny over Palestinian communications as a form of secret diplomacy involving its closest ally in the Middle East (Israel) is mere speculation, the claim I am defending here is not that the scenarios illustrated in the preceding materialize for sure, but that they fall within the realm of the technically possible as well as of the politically plausible—which is problematic enough. Customarily, the enactment of data-localization requirements is employed by autocracies to keep controlling a state’s data “onshore,” but this does not necessarily circumvent the mechanism just described, as it speaks of where the data is ultimately stored, and not necessarily about its journey to get there. Furthermore, data localization is also used by autocratic regimes to spy on their “citizens,”Footnote122 but also by democracies supposedly to prevent cyber-enabled foreign espionage from occurring.Footnote123 Yet in this case Israel shows no apparent reluctance in having its Internet data stored in the United States; thus, not only are “the security-industrial complexes of Israel and the United States […] in the process of integrating seamlessly with the military-industrial complexes of those [states],”Footnote124 but Internet policing is following suit.

Internet governance is also involved in a still very much politicized but somewhat less technical sense, as far as public–private partnerships are concerned.Footnote125 These partnerships preside over the functioning of the Internet worldwide, with tensions arising from their inherently Western affiliations,Footnote126 which some may expect to go so far as to make them prone to hidden vetoes by the U.S. administration.

Telecommunications networks and digital infrastructure regimes have become the lifeline of neoliberal globalization enforced by[, e.g.,] the Internet Corporation for Assigned Names and Numbers [ICANN]. Like cyber Gods, these anonymous entities can […] allocate URL names and addresses to some nations while precluding others, Palestine being a case in point […]. New ICTs are thus protected through an inherited inequality between North and South.Footnote127

On another note, because shutting down only part of the network in times of emergency is technically unfeasible, the whole of the Internet is often characterized as “critical infrastructure,” placing it under regimes of executive exceptionalism even in times of peace—for example, in the United StatesFootnote128 and of course China.Footnote129 Data flows are, at any rate, impossible to control: The route that every bit of information takes to reach its addressee would be far too much for any administration to keep track of, even via artificial intelligence, which is why administrations prefer to operate at the sending and/or receiving ends, that is, at ISPs level. The latter can cooperate with governments not only in storing log data (metadata) and so on and in preventing access to certain websites (bandwidth capping), but also in downgrading the connection altogether (bandwidth throttling),Footnote130 so much so that forms of intermediary/vicarious liability could be hypothesized. In any case, what cannot be mistaken is that connection speed is always lower across Palestine compared to Israel, especially in Gaza.Footnote131 Filtering, which “typically utilises router-based IP blocking, proxy servers, and DNS redirection,”Footnote132 is also routinely used. Similarly, governments cooperate with messaging apps; this is a concrete problem insofar as these apps are often part of United States-based corporate conglomerates and digital ecosystems, as in the case of WhatsApp—widely used by Palestinians—being owned by Facebook.Footnote133

Digital rights are also impacted by tangible measures immediately applied onto physical goods, and in this sense, within the context of Palestine generally, the situation in Gaza has been bearing, already prior to the 2023–2024 Hamas–Israel conflict, most of the hardest-to-solve complications. To frame the hurdles, a parallel may be drawn to the phenomena of “overt” and “hidden” hunger in the Palestinian territories,Footnote134 whereby Palestinians’ segregation features a conjunction of both quantitative and qualitative elements, with the sufficiency of the former being used to dismiss concerns over the insufficiency of the latter. Far more frequently and severely, when compared to the West Bank’s inhabitants, Gaza’s ones are subjected to import/export restrictions and inspections,Footnote135 during which further surveillance hardware can be installed or countersurveillance software can be screened out by the Israeli authorities; additionally, Palestinian houses and workplaces are regularly demolished to free up space and “enhance security” for the illegal Israeli settlers,Footnote136 and in those occasions as well as at the borders, IT equipment easily gets either destroyed or confiscatedFootnote137—hard to tell which option is worse for Palestinians’ development and privacy. Import restrictions are also applied indirectly through taxation,Footnote138 which stands as tantamount to a nonphysical entry barrier due to increased costsFootnote139 disproportionately impacting the poor; fiscal losses to Palestine’s public budget due to Israeli constraints upon the Palestinian ICT sectorFootnote140 shall also be noted. The legal argument one may advance is not that Israel—as a matter of IHL, which is the primary legal framework applicable to the OPT—is obliged to supply goods and services or even to allow them to independently thrive. Rather, the argument goes that confronting the specific long-standing circumstances of Palestine, the double applicability of IHR and IHRL is theoretically tenable as much as practically meaningful. As a matter of IHRL,

in certain circumstances corporations should be obligated to supply goods and services, at least when the affected population has no recourse to alternative venues by which to obtain such services or commercial goods. This situation may occur when (1) a corporation enjoys a monopoly over the supply of a certain good, inter alia, due to the home state’s exclusive control of trade with the host state (in the cases discussed in this article this monopoly is created through military and legal restrictions over trade with Gaza), or due to a specific corporation’s exclusive right to supply an essential good […]; or (2) when a corporation has control over […] essential infrastructure.Footnote141

The “hard components” of the Internet are, indeed, essential—or “critical,” as explained supra—infrastructure over which Israeli corporations exercise a de facto monopoly, and technological devices should be provided by Israeli companies insofar as it is made impossible for Palestinians to acquire them otherwise.

Interestingly, although the most elementary layers of censorship and surveillance may be circumvented relatively easily through rerouting (VPNs), anonymous communication (Tor), and browsing, as well as third-party-managed encryption services, widespread mistrust remains amid activists toward these forms of concealing, perceived to be somewhat undignified and anyway “illegal” or untrustworthy, or however not in line with principles of openness, publicness, transparency, open resistance, and inclusivity that certain activist organizations cite as their flagship communication values.Footnote142 Despite the relative ease of access to and proficiency in such anonymizing technologies, the main problem does remain digital literacy.Footnote143 “Literacy,” in this sense, is far more than a technical skillset: It represents the socially encouraged access to a combination of hardware, software, human, and institutional supportFootnote144 ultimately depending on the inheritance and perpetuation of politically sanctioned circumstancesFootnote145 but also national imaginaries.Footnote146 Having said that, the activists’ attitude just described seems to stand in contradiction to another tendency that often manifests itself in contexts of privacy–power imbalance, namely, the so-called “privacy self-efficacy,” whereby

Obtaining desired results is more important than fully comprehending the underlying technical or legal contexts. While practical, this view also highlights a major constraint on users’ agency, as “doing without understanding” may reify existing power structures, likely reinforcing the relatively powerless status of already marginalized groups.Footnote147

The mentioned view might also deepen a sense of fear and insecurity arising from the fact that one is not comfortable with being immersed in a reality for which the mechanisms are increasingly complex and technical, and for which the management is more and more outsourced to “experts” also identifiable as techno-extensions of politically motived bureaucracies, whose “intimate desires” are ostensibly charged upon choices of otherness sold as specialistic and thus techno-necessary and foundationally, uncontestably “true.” At other times, it is exactly the consummate understanding of technology, instead, that leads to suspicion, no matter how rumor-based it sounds; for instance, an allegation was circulated that “an Israeli company [wa]s lowering the price of navigation systems (GPS) in order to sell it to Palestinians and thereby increase their surveillance.”Footnote148

Regulatory Implications for Social Media

While the Internet broadly understood is not the only technological or “mass media” device subjected to Israeli censorship (with TVs and radios regularly adhering to the same fate), social media are certainly more pervasive and impactful nowadays: “A qualitative difference between internet and other media forms are the participative elements provided to its consumers/users.”Footnote149 This helps explain why high degrees of actual or expected social-media censorship generate a subconscious sense of intellectual dependence on and complacency with the (actual or semi-imagined) censors. Although these dynamics are at play globally as “attention economy” and “surveillance capitalism,”Footnote150 what differs from other areas of the world is that Palestinians have to please multiple corporate and public actors at once, while managing to survive the intricacies of their daily struggle, also thanks to these very same platforms and devices. It seems increasingly obvious that America’s “woke capitalism” and Israel’s surveillance brutally coalesce in Palestine into a sinister market–security tandem.

The structural violence of this system is modeled, once again, on the apartheid precedent, whereby “the inferior” shall implore “the dominant” to be afforded a new technology or be granted their permission before installing or using their own. Curiously, some states in the region act upon offline but reportedly not online censoring policies, meaning for instance that Jordani citizens were operating online by a sort of self-restraint a couple of decades ago,Footnote151 and this unwritten social equilibrium might have consolidated over the years—a similar tacit pact seems to be alive and well complied with in Saudi Arabia and elsewhere in the Gulf.Footnote152 Conversely, others in the region, like Iran, have adopted a traditional censorship scheme at the major ISPs level.Footnote153

Because real street-protests are consistently repressed with brutality in Palestine (not only by Israeli soldiers), social media have acquired the role of sites for popular contestation and for organizing and staging protests at least virtually,Footnote154 channeling the expression of political concerns both individually and collectively and aiding the recruiting of (often only virtual) fighters as well as the dissemination of political idea(l)s.Footnote155 Tawil-Souri and Aouragh famously termed this “Intifada 3.0,”Footnote156 as a follow-up to the two intifadas that had unfolded offline. More moderately, social media also serve the function of re-policing memoryFootnote157 and of supporting pathos with logos, that is, narration as reasoned information without preset emotional overloading.Footnote158 Needless to remark, “undisciplining memory” is of poignant significance in Israel, and the law plays a pivotal role in delineating what falls within and outside the perimeter of the memory discipline. The Nakba Law offers a paradigmatic legislative instance to this effect:

It fines state-supported institutions that mark “Independence Day or the day of the establishment of the state as a day of mourning”. It is the Palestinians, who account for approximately 20 percent of the population, who mourn on Israeli Independence Day. When Israelis celebrate the War of Independence as a miraculous victory against all odds that resulted in many casualties (1 percent of the population), Palestinians mark their loss in the 1948 war, which resulted in their massive displacement and dispossession, also known as al-Nakba. This is why the law intended to fine Palestinian commemoration is commonly known as “the Nakba Law.” Israelis and Palestinians commemorate the war through opposite national narratives. In the dominant Zionist narrative, it is similar to David’s miraculous victory over Goliath, who represents the Arab countries who fought alongside the Palestinians. However, the Palestinian national narrative construes the events of 1948 as a tragedy inflicted on unequipped and unprepared peasants who were betrayed by both Britain and the Arab countries and subjected to an organized campaign of ethnic cleansing by Israeli military forces.Footnote159

The beneficial effect of digital rights as the enablers of repositories of memory seldom concretize, though. One reason for this is that Palestinians’ social-media resistance is increasingly concentrated onto a few platforms and, within them, a limited number of channels, which are thus easily monopolizable and manipulatable by infiltrated outsiders.Footnote160 This worsens with the curation of digital geographiesFootnote161 being pursued by content creators (platform users) only initially, while being subsequently influenced by “algorithmic allocation” (e.g., on what contents get more exposure to and thus higher engagement by and/or interaction with similar/uneven groups of users), which—even assuming algorithms have been coded “neutrally”—will take into account the strategies and preferences of the data colonizer, too.Footnote162 Some strategies will “enter the code” by means of the data it is fed with, while others result from very basic marketing such as targeted advertising and search-result optimization. Some expressions of digital resistance elaborated by Palestinian young artists showcase artistic proficiency, but platforms are so rigged to favor the powerful and disfavor intellectual debate online that it should surprise no one if the “post-Oslo generation […] is disillusioned with existing political frameworks, in particular with that of post-Oslo state building, but also, to a certain extent, with a confined narrow conceptualization of resistance art.”Footnote163

All considered, social media in Palestine have functioned as a centralized echo chamber for Palestinian municipalities to spread the word around their “success stories,”Footnote164 as much as a distracting tool crafted around addicting self-gratification, diversion, and escapism, particularly for the younger generations. Addiction arises from the precluded access to political engagement rather than to the availability of online channels for political expression, and findings to the reverse are contradictory as much as unpersuasive.Footnote165 This sort of circensem sine panem is alienatingly exemplified by “TEDxRamallah,” which was rightly identified as a meaningful act of United States-sponsored “hallucination of normalcy” in the West Bank.Footnote166 Not by accident, the political strategy pursued by the United States itself has been that of “removing” or “siding” the experience of alienation and frustration endured by young Palestinians in order to create a future cohort of more individualistic and Israel-friendly (or at least Israel-neutral) Arabs, leveraging on those younger generations’ biographical distance from the Israeli forced expropriation of their lands and, ultimately, of their culture as well as collective future.Footnote167 And yet this is the very strategy adopted by Palestinians leaders, too, who “sponsored ‘resistance culture’, on the one hand, and ‘normalized’ the very occupying power that was being resisted, on the other.”Footnote168 As social-media artistic creations can be equated to more traditional, “offline” forms of cultural resistance—or help circulate themFootnote169—this normalization bears momentous implications for the Palestinians’ use of and trust in the Internet for said purposes. Content censorship implies that a potentially “dual-use” technology such as social-media platforms is only left with facetious cosmetics, and brought to Palestinian youth as politically disengaged, reflection-spared gaming. This feeds and worsens a spiral of betrayal, humiliation, and hopelessness both in the older generations—whose fight has ignited more violently because of their closer living proximation to the twentieth century’s forced displacement events—and in the younger ones as they mature and acknowledge the gamble that is being played on them. Indeed, automated news-making looks prima facie less biased than traditional centralized media,Footnote170 yet when the spell fades and young Palestinians realize the politically driven automation feeding their social-media profiles, and that such newsmaking can be manipulated and manipulative, their resentment and frustration erupt even more violently.

In asymmetric economies and societies, especially where fractions thereof are not premised upon the rule of law, the Internet becomes ipso facto a propaganda reinforcer. This is optimal for Israel in that the Israeli state, since its inception, has already been polishing up its propaganda channels through the so-called Hasbara (Hebrew: הַסְבָּרָה‎), in a systematic and systemic fashion, including by contracting copywriters dedicated to editing Wikipedia entries as to make Israel shine therein.Footnote171 Most recently, Twitter and Telegram have been inundated with propaganda by the Israeli government, which has been tolerated in its sharing of extremely violent and hateful contentFootnote172—content that, when coming from other governments or organizations, would have arguably been ex ante banned or ex post removed. And U.S. newspapers have been (or “felt”) encouraged to “disproportionately [emphasize] Israeli deaths in the conflict [and deploy] emotive language to describe the killings of Israelis, but not Palestinians.”Footnote173

Tellingly enough, it reads as if it was not violence comprehensively that needed to be countered online, but “incitement to hatred” only on the side of Palestinians: contrariwise, Israeli online violence is tolerated, as clarified by the way Facebook has handled both sides of the claim differently.Footnote174 “Frustrated that Facebook was not cooperating satisfactorily, [Israeli] Public Security Minister Gilad Erdan appeared on television calling Facebook a ‘monster’ and said ‘some of the victims’ blood is on Zuckerberg’s hands’”Footnote175—but according to him, that only worked for (the comparably very few) Israeli victims of “terrorist” attacks! All Palestinian civilians (including hundreds of children) who have perished out of clashes with Israeli settlers, occupiers, and soldiers as a follow-up to social-media incitement by Hebrew Israeli citizens matter nothing to their ill-intentioned minds.Footnote176 Resultantly, I am unsure social media platforms are being mistrusted for “adopting content standards that are deemed either too restrictive or too permissive”Footnote177 generally; it occurs to me they are rather criticized due to their double standards in enforcing whatever policy they adopt, not only when it comes to verifiable yet potentially dangerous and hatred-fueling information (like “incitement to violence” or “hate speech”Footnote178), but also vis-à-vis the so-called “fake news”—which is almost never completely true or completely false, nor fully real or fully fakeFootnote179—and its legal consequences.

One party’s martyrs are the other party’s terrorists, but only the second narrative survives “moderation.” In this sense, even though the Internet is “simultaneously oppressive and progressive, enabling both domination and resistance,”Footnote180 power asymmetry coupled with the specific infrastructural configuration of Palestine make it biased toward oppression. In fact, moderation biases trigger “feelings of alienation, frustration, and moral outrage within individuals and communities whose content is erroneously removed or restricted.”Footnote181 Differently from other states in the region, Israel does not consistently or proactively filter out Facebook et similia for Palestinians at the ISPs levelFootnote182; this is because rather than blocking these platforms per se (and being probably aware that these blockings can be circumvented with relative ease, as described earlier), it is resolute to turn them to its own propagandistic and selectively censorial advantage—this is a much smarter solution, indeed.

For Palestinians, social-media use often turns to a manifestation of their “home nostalgia,”Footnote183 but on the negative, it is also felt as part of the Israeli project of “violently dismantling the urban, civil, and infrastructural foundation of the proto-Palestinian state”Footnote184; indeed, large digital infrastructures play a semiotic function in the city and for democracy,Footnote185 just like nondigital ones with their presence in the urban texture. Poignantly, Israel is reiterating vis-à-vis “its” digital infrastructure in Palestine the same policies it applies to offline urban management there, starting with territorial balkanization and the consequent segregations of communities living thereupon, not to mention abusive colonial settlements, in what one might trace a parallelism between offlife and onlife planning of the social. “Palestine, as a nation in its abstract sense and as a territory more concretely, faces a form of colonial subjugation motivated by emptying the land of its inhabitants rather than ‘civilizing’ the people,”Footnote186 with predilection for the latter’s objective only when the first proves unattainable, or where Palestinians are vilified and dehumanized.Footnote187 The Internet plays a role toward both objectives, which reinforces the salience of conceiving the cyberspace as a territorially anchored dimension of the living, rather than as “aterritoriality” or anyway “else” from the physical territory.

In fact, far from being a borderless space, the “cyberspace” is bounded by technological infrastructure and the extractive dominion thereover.Footnote188 And the same fragmentation one can spot in the Palestinian territory—the infamous “archipelago of isolated enclosures”Footnote189—is generated at the societal level, too, by means of extreme individualization. Does this choice owe to the most classic divide et impera,Footnote190 or does it also symbolize the will on the part of Palestinian authorities to attempt a less collective route toward emancipation? Encouraging individualization seems closer to a coherent project of subjugation, that is, to a politics of spacio-cide that goes beyond urbicide in that it systematically denies room (“space”) for demographic growth.Footnote191 Technology fits the mentioned project insofar as Internet (and ICT more generally) infrastructure is tied to a certain capacity preset by law that is never subsequently updated (e.g., through more bandwidth or frequency spectrum) in relation to the upscaling demographic needs of the local population.

Hereby the distinction between expressive and consequentialist law-acts gains momentum: The first are meant to express certain values at the time of drafting/enforcement, while the second might express those values in the future by originating a certain set of behaviors that were foreseen by the legislator. Consequentialist law-acts are also aimed at widespread receptions on the part of the targets, who will, in turn, express such values through their actionsFootnote192; these laws as perlocutionary acts easily end up bringing about humiliating objectification.Footnote193 Palestinians’ decolonial resistance against surveillance cannot be accurately understood through Western lawyering eyes, in that it is not (yet) based on an individual legal recourse whereby “reading the laws” is a means for “knowing one’s privacy rights” in detail; instead, it has to be channeled through general change collectively and wider emancipation and awareness within society.Footnote194 Indeed, a nonnegligible percentage of Palestinians themselves prefer to connect their devices to the networks (unlawfully) made available by Israel to its settlers in the West BankFootnote195; this choice is performed to double detriment, to the market development of their own operators and to fellow Palestinians’ freedoms. This implies that higher awareness and collective ethics are warranted on the side of Palestinians, too, although younger generations seem more inclined to pay attention to these “conflicts of interests”; Hitchcock reports the interesting example of a schoolkid who charged Motorola for breaching their privacy by selling their personal data to Israeli authorities arguably in exchange for money or business favors and other facilitations.Footnote196

The “Westernization” of the Palestinian ICT discourse is not warranted linguistically, either, although again, it is Palestinians themselves who lay the foundations for this to happen; as briefly touched upon by Shalhoub-Kevorkian, English is preferred as an idiom of emancipation and “transnationalist appeal,” even though not only Arabic texts are often machine-translated into English, feeding misunderstanding,Footnote197 but also English is the average language programmers of spying software are proficient in, so that the algorithms they code are primarily fed with English terminology. Last but truly not least in light of our discussion taken as a whole, English is the U.S. language, and most communications are routed through the United States and/or surveiled in cooperation with the Americans. In all probability, this is not the smartest way for sensitive topics to be discussed online in Palestine.

Tentative Policy Proposals

By way of assuming a minimal degree of good faith on the part of Israeli and Palestinian authorities alike, and keeping the former’s (more or less justified) ontological security anxieties in mind, one may formulate a number of suggestions. To begin with, what about turning Israeli cybersecurity assessments for new infrastructureFootnote198 into participatory projects including—to a certain extent, at least—Palestinians?

When it comes to social media, Facebook and similar corporations usually feel cornered also due to threatened or actual lawsuits from Global North firms, like those representing Israeli families claiming that Palestinians use Facebook to incite violence resulting in Israeli injuries; what about shielding Facebook et similia from these lawsuits, which resemble a paradoxical reversal of human-rights lawyers’ “impact litigation” strategy? As social media become a battleground for competing narratives, it seems necessary to ensure that preemptory silencing is not confined to litigation routes only available to the wealthy and dominant. Either litigation becomes affordable and practicable for all parties involved (which is unlikely, especially with reference to the burden of evidence gathering), or the law should abstain from restraining platform neutrality. This means shielding social-media platforms from frivolous lawsuits, but also ensuring that organizations are not themselves targeted for what they write therein via overbroad communication clauses of “security” statutes. For instance, in the United States,

One of the world’s oldest Zionist organisations with close ties to the Israeli government, the Jewish National Fund (JNF), is using American anti-terrorism laws to sue [… t]he US Campaign for Palestinian Rights, a coalition of groups seeking to end the decades-long occupation of East Jerusalem and the West Bank.Footnote199

Corporations’ positioning is a complex balancing affair. With regard to the most recent atrocities in the 2023 Israel–Hamas war, it was noted that “Some companies have been criticised for ‘picking a side’; others condemned for their silence.”Footnote200 One solution could be to ensure that on the one hand, social-media and content-sharing platforms like Facebook, Instagram, Twitter, YouTube, and TikTok actually enforce their proclaimed neutralityFootnote201 (including by preventing algorithmic “shadowbanning”Footnote202), while on the other, “silencing lawsuits” are by-default dismissed. Ultimately, it would be on the courts to establish where the threshold lies for characterizing a lawsuit as “silencing”; while specific content shared by and against specific individuals might prove more open to contestation,Footnote203 an immediate connection to extremely recent events involving large fractions of systematically abused populations and long-standing group political claims should definitely be a warning sign that the lawsuit displays a preemptive character.

On a related note, this essay has described a tangled situation where a public actor (the state of Israel, primarily) is interfacing with private ones like Facebook. It seems unreasonable, or at least premature, to expect Facebook to hold itself publicly accountable on the contents it removes; also, it can hardly be compelled to endure such accountability. However, while Facebook acts discretionally to remove whatever it pleases (also confidentially), the counterpart (removal-requesting party) is public, and therefore one way forward could be that most—if not all—requests forwarded to Facebook be published on institutional websites; this could be done perhaps without specifying any motivation (which might include sensitive security data or state secrets, classified information, etc.) but still showing the name, date, and content of the posts for which removal is sought. Other scholars advised on publishing any agreement between private platforms and Israel,Footnote204 which unfortunately seems unlikely to happen anytime soon because even assuming such agreements can be produced as formal documents, Israel would never agree to publish them out of reasonable fears of (further) major blows to its international reputation. Despite exceptional contrary examples retrievable from the United States,Footnote205 it is also unreasonable to expect companies themselves to publish governmental requests to access data—that might even be unlawful if they are covered by executive privilege. Eventually, governments should publish, if not requests to access data, at least those to eliminate posts that are not under criminal investigation. Alternatively, requests to social media should be submitted under judicial oversight—according to the U.S. Department of StateFootnote206 and Sander,Footnote207 currently they often are not—or perhaps even a bipartisan Israeli–Palestinian committee—no matter how unrealistic this might sound at this turn of history. This is not the same as to suggest—as the International Bank for Reconstruction and Development inexplicably didFootnote208—any strengthening of shared or jointly operated networks between the two sides.

One more policy proposal is that content moderation should be grounded on actual content as opposed to who is it that posts or shares it; this solution will prove algorithmically harder to encode, but also fairer and neutral to all parties involved. In other words, social-media and content-sharing platforms are advised against removing contents or users based on state-backed listing of organizations as “terrorist” and alike, and states should refrain from legislating in such a way to force them to do so. Indeed, as difficult as it might prove for some of us to accept, “terrorism” probably stands as the most controversial term of contemporary times in policy and adjudication,Footnote209 and those who are labeled as “terrorists” by one state might legitimately be considered “freedom fighters” by another, so that content moderation should never turn into organization moderation. Hateful and violence-inciting content could still be removed, but not depending on whether those who are posting it are legitimized or blacklisted by the public authorities of a specific state (or group of states). Unsurprisingly, this issue has gained momentum during the latest “digital confrontations” accompanying the Israel–Hamas war, where Facebook, YouTube and TikTok have banned Hamas content altogether, Twitter has largely “failed” to enforce its own ban, and Telegram has generally allowed Hamas-produced or Hamas-distributed content to circulate.Footnote210 Curiously enough, in an unprecedented move, the European Commission zealously probed (and stopped advertising on) Twitter under the EU’s Digital Services Act for the sharing of “misleading” (understood as Israel-critical) information on the conflict,Footnote211 as if Twitter had never allowed the sharing of equally “misleading” information against Palestinians over the previous months and years. It is not for this article to decide whether Hamas or any other organization should be listed as “terrorist” while others are not, but it seems fair to advise that in this context, certain Hamas contents could be removed based on the content itself, rather than due to the organization being listed as “terrorist” by specific states. Indeed, the very same organization, including Hamas, could be considered “terrorist” or “freedom-fighting” not just by different populations, but by different states, too.Footnote212 It is precisely in light of sovereignty on infrastructure issues that we should tie content moderation to the content itself, as opposed to the public “affiliation,” “recognition,” or “accreditation” of those creating, posting, and sharing such content; the risk in doing otherwise would be to tie content moderation to (contended) sovereignty as opposed to message merit. Put differently, the risk is that territories and populations relying on “less sovereign” Internet infrastructure will need to concede more to the content-moderation preferences of third parties, that is, “more sovereign” states on whose infrastructure their own infrastructure partly depends—and on their most influential technology and “security” providers. Although content moderation policies based on organizations’ public status inevitably promote inter-state conflict about who is censored and who is not, status-neutral moderation would arguably help attenuate (justification for) Internet fragmentation along regional, sociocultural, sectarian, and ideological lines—especially between “the West” and “the Rest.”

One more content-moderation related policy observation, as a partial caveat to the preceding, is due. Upon invading Gaza in October 2023, the Israel Defense Forces (IDF) and even some Israeli ministries were allowed to freely post and “tweet” videos of and written/oral commentaries to alleged war crimes, in order to steer internal political propaganda. This is widely documented, most comprehensively within South Africa’s submission to the ICJ.Footnote213 Platforms generally acquiesced to it under the argument that those acts were committed (and narrated) by (the “official” representatives of) a “regular” army of a “legitimate” state actor. Some of these contents would have plausibly not survived the scrutiny of a merit-based content-moderation policy. Yet a potential “conflict of interests” shall be acknowledged with evidence-gathering and fact-finding: To complement the risky fieldwork of journalists and grassroot human-rights movements, it is precisely thanks to such a “generous” IDF posting that the international community could gather verifiable evidence of Israeli alleged crimes. This “open-source” evidence can be later tendered to the International Criminal Court and similar criminal tribunals,Footnote214 or even reported, as it happened indeed, within submissions to the ICJ. This is to say that, in some way, content moderation on Israel would have restrained the world’s ability to take cognizance of the extremely questionable modes (if perhaps not rules) of engagement operated by the IDF. An inherent tension exists between moderating content for preventative purposes and obtaining potential evidence of war crimes,Footnote215 and while “merit-based” moderation can help soothe the resentment, hatred, and violence, as well as prevent emulation acts and radicalization on all sides, it could also hinder the acquisition of open-source evidence of state-backed crimes (including their most invaluable “intent” component, as in the case of genocide allegations). The balance to be sought is a difficult (and probably context-sensitive) one, and can only be addressed in another article.

Alongside content moderation, statecraft, traditional and business diplomacy, technology transfer, development cooperation, and humanitarian assistance also cover essential functions. “E-infrastructure” diversification thanks to development cooperation with other geopolitical playersFootnote216 is praiseworthy, although one should be reminded that mentioned e-infrastructure usually refers to web portals and so on, rather than to the Internet’s “hard infrastructure” built on cables, access points, and servers. Other actions in the field manifest in the form of institutional “study visits” to, for example, the European Union (EU),Footnote217 which can do fairly little to help Palestinians in loco, although is admittedly valuable as far as academic collegiality and, to an extent, e-governmentFootnote218 are concerned. One closing comment is perhaps of convenience. The EU noted that in Palestine,

neither the Basic LawFootnote219 nor other laws establish the process through which policies are formulated and laws are prepared within the government and sent for approval either through the regular procedure or the extraordinary one. Thus, laws tend to be drafted without a specific guiding policy and in the context of institutional competition. In the absence of a set legislative procedure within the government, regulatory impact assessments are not conducted, legislative policy memoranda are scarce, while inter-institutional consultations are inadequate and are not part of a general development vision regulated through annual legislative plans. […] As a result, ad hoc committees are regularly set up to work on legislation, whether focusing on specific laws (e.g. committees for the amendments of the Judicial Authority Law and the cyber-crime law) or on the harmonisation with international human rights treaties.Footnote220

Because most needs and emotions of the population are canalized through the Internet today, this is too important a policy area for being left to faceless committees with no accountability to the citizenry, which also remove from impact assessments—even if they were transparently conducted—any political bearing. This implies, inter alia, that any serious commitment to lasting peace, being it through a one-state or two-states solution, will need to account for either a shared Internet infrastructure that works alike for all parties, or a separate infrastructure for each state where none of the two technically depends on the other.

Conclusion

The United States retains its role as the by far most powerful and controversial international player in the Israeli–Palestinian chessboard. In most recent years, its influence extended from altering Palestinian priorities in response to the Arab Spring(s), to mediating normalization processes between Israel and Sunni regional actors with no reference to Palestine. Furthermore, its intelligence agencies cooperate with Israel on regional cyberdeterrenceFootnote221 and on all major “counterterrorism” dossiers impacting Palestinians’ life, a significant number thereof pertaining to the policing of the Internet across Gaza and the West Bank. As if these regulatory and technological exchanges did not suffice, Israel controls some of the key ISPs that serve(d) Palestinians, especially in Gaza; hence, it can easily compel those ISPs to filter information as to perform as propaganda reinforcers to the U.S. benefit.

Moreover, the United States is where most Internet data from and to Palestine transits and can thus be asserted jurisdiction over and surveiled with scant judicial or even political accountability. Far from being speculative, this argument stands as politically reasonable and technically attainable because of the several verified instances of information censorship operated upon instructions by government-tied U.S. corporations, especially during confrontational seasons. Worryingly, Palestinian authorities themselves contribute to creating information clusters and identity bubbles, with infrastructural deficiencies as well as executive and court orders undermining freedom of expression online and prohibiting access to certain websites under the usual vague, meaningless aegis of “public morals” or “security” concerns.

The combined effect of these deliberate and casual informational biases, supported by an unanticipated convergence of interests between West Bank and Israeli authorities in restricting online access and freedom of expression, is aiding the United States to maintain its tech-savvy hegemony in the region not simply through diplomatic and military means, but equally rhetoric-wise, on the more normative side. This interrogates the current trends of capitalism-powered regulatory capture that, far from standing as an exclusively Western problem, influence Palestinians’ rights on an everyday basis. The policy proposals outlined in the preceding might embody a first step toward Palestinians’ emancipation from Israeli–U.S. surveillance and censorship online. However, their success is contingent on scholarly and policymaking communities realizing that unless the infrastructure is uncaptured from foreign jurisdictional assertions and the primacy of unaccountable corporations, any efforts on the legal side will be frustrated by the current technical design of Internet networks—in Palestine and beyond.

While this research has situated its research questions within the specific complexity of Palestine, their broader significance warrants further research in multiple directions. The most obvious is the effect of military occupation, techno-enabled neocolonial regimes, and power asymmetries in contexts of “borderline statehood” onto the governance of Internet infrastructure and, as a reflection thereof, online content, information flows, and perception management. Relatedly, studies are called for with respect to the relationship between online and offline “networked élites,” insofar as the Internet reshapes the functioning of networks of clientelism and capture without, however, fundamentally altering the inequality divides that characterize structural subalternity at the group and national level, that is, the ability to capture lawmaking processes and exercise hegemony. Finally, the perennial regulatory question of how to properly embed these transformations within “fairer” legal regimes “by design” is probably worth continued asking. The law’s ineptitude toward abandoning old-fashioned dichotomies (starting with the public/private dichotomy) shall be overcome if people are to preserve the conviction (or perhaps the illusion) that the complexity of technologically enabled framings of social reality can find in the law a source of order as safety and emancipation, as opposed to order as stagnation and oppression.

Acknowledgments

An earlier draft of the present work was presented at the Workshop on “Algorithmic and Technological Modes of In-/Exclusion – International Legal Method and Critique” organised at Utrecht University Law School by the ESIL Interest Group on International Law and Technology on 31 August 2022, during the ESIL Annual Conference 2022. The author would like to acknowledge insights from the workshop panelists and attendees, and in particular from the paper discussant Dr. Roxana Vatanparast.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Notes

1 Georg Glasze et al., Contested Spatialities of Digital Sovereignty, Geopolitics (2022), https://doi.org/10.1080/14650045.2022.2050070.

2 Giovanni De Gregorio, Democratising Online Content Moderation: A Constitutional Framework, 36 Computer Law & Security Review 105374 (2020).

3 Juan Ortiz Freuler, The Weaponization of Private Corporate Infrastructure: Internet Fragmentation and Coercive Diplomacy in the 21st Century, 8 Global Media and China 6–23 (2023).

4 Eva Claessen, Reshaping the Internet—The Impact of the Securitisation of Internet Infrastructure on Approaches to Internet Governance: The Case of Russia and the EU, 5 Journal of Cyber Policy 140–157 (2020); Sarah Backman, Risk vs. Threat-based cybersecurity: The Case of the EU, 32 European Security 85–103 (2023); Andrea Calderaro and Stella Blumfelde, Artificial Intelligence and EU Security: The False Promise of Digital Sovereignty, 31 European Security 415–434 (2022).

5 Chunmeizi Su and Wanija Tang, Data Sovereignty and Platform Neutrality—A Comparative Study on TikTok’s Data Policy, 8 Global Media and China 57–71, 59–61 (2023); Mariëlle Wijermars, Selling Internet Control: The Framing of the Russian Ban of Messaging App Telegram, 25 Information, Communication & Society 2190–2206 (2022).

6 Laura DeNardis, Hidden Levers of Internet Control: An Infrastructure-Based Theory of Internet Governance, 15 Information, Communication & Society 720–738 (2012).

7 Samantha Bradshaw and Laura Denardis, Internet Infrastructure as an Emerging Terrain of Disinformation, Centre for International Governance Innovation (2022), https://www.cigionline.org/articles/internet-infrastructure-as-an-emerging-terrain-of-disinformation; Niels ten Oever, Norm Conflict in the Governance of Transnational and Distributed Infrastructures: The Case of Internet Routing, Globalizations 184–200, 186 (2023).

8 Callum J. Harvey and Christopher L. Moore, The Client Net State: Trajectories of State Control Over Cyberspace, 15 Policy & Internet 133–151 (2023).

9 Iosifidis and Wheeler, 2016, 71, emphases in the original.

10 James Titcomb, Israel Grants Musk Approval to Turn on Starlink Internet Access in Gaza, The Telegraph (2023), https://www.telegraph.co.uk/business/2023/11/27/israel-elon-musk-starlink-internet-gaza-approval; Clarence Leong, Taiwan Looks to Ukraine Playbook in Race to Build Satellite Internet, The Wall Street Journal (2023), https://www.wsj.com/articles/taiwan-looks-to-ukraine-playbook-in-race-to-build-satellite-internet-b46a5a92; Amritha Jayanti, Starlink and the Russia–Ukraine War: A Case of Commercial Technology and Public Purpose?, Belfer Center for Science and International Affairs at Harvard Kennedy School (2023), https://www.belfercenter.org/publication/starlink-and-russia-ukraine-war-case-commercial-technology-and-public-purpose.

11 Iosifidis and Wheeler, op. cit., 268–272. See also UN Human Rights Council, Fortieth Session (25 February–22 March 2019), Agenda Item 7: Human Rights Situation in Palestine and Other Occupied Arab Territories, Report of the detailed findings of the independent international Commission of inquiry on the protests in the Occupied Palestinian Territory, A/HRC/40/CRP.2, paras. 655–683 (18 March 2019).

12 Giampiero Giacomello, National Governments and Control of the Internet: A Digital Challenge, 72 (Routledge, 2005).

13 Jess L. Bier, Mapping Israel, Mapping Palestine: How Segregated Landscapes Shape Scientific Knowledge, Unpublished PhD Thesis in Urban Sociology at Maastricht University, 28, 132, 166 (2014); Olga Solombrino, Arcipelago Palestina: Territori e narrazioni digitali (Mimesis, 2024).

14 Silvia M. Lindtner et al., Restoring the Depleted World (Precarity Lab eds., Technoprecarious, Goldsmiths Press, 2020), https://goldsmithspress.pubpub.org/pub/b23m1al8/release/1?readingCollection=a89d3b23.

15 Ibid.

16 Christopher John Robert Dugard and John Reynolds, Apartheid, International Law, and the Occupied Palestinian Territory, 24 European Journal of International Law 867–913, 910 (2013).

17 Refer to Ylenia Gostoli, How the Internet Punishes Palestinians, Al Jazeera (2018), https://www.aljazeera.com/news/2018/2/2/how-the-internet-punishes-palestinians.

18 Marissa Newman, Google Maps Disables Live Traffic Data in Israel, Gaza at Military Request, Bloomberg (2023), https://www.bloomberg.com/news/articles/2023-10-23/google-disables-live-traffic-in-israel-gaza-at-military-request; Chris Morris, Google Maps, Waze Disable Live Traffic Data in Israel, Fortune (2023), https://fortune.com/2023/10/24/google-maps-waze-disable-live-traffic-data-israel-gaza-hamas.

19 Article 4(a)(7–8) of the Presidential Decree No. 16 of 2006 Concerning the Regulation of the Public Administration of the Crossing Points and Borders, enacted on 18 March 2006, officially promulgated in the Gazette of 14 June 2006 no 65, 27, as reported in Roland Friedrich, Arnold Luethold, and Firas Milhem (eds), The Security Sector Legislation of the Palestinian National Authority, 270 (DCAF, 2008).

20 Helga Tawil-Souri (لجا طويل-الصوري‎), Cellular Borders: Dis/Connecting Phone Calls in Israel-Palestine, in Lisa Ann Parks and Nicole Starosielski (eds), Signal Traffic: Critical Studies of Media Infrastructures 157–180, 171–175 (OUP, 2015); Who Profits Research Center (2018) Communications infrastructure in Palestine has become a tool of repression, OpenGlobalRights, https://www.openglobalrights.org/communications-infrastructure-in-palestine-has-become-a-tool-of-repression/.

21 Tawil-Souri, op. cit., 160–165.

22 Fabio Cristiano, Internet Access as Human Right: A Dystopian Critique from the Occupied Palestinian Territory, in Gabriel Blouin-Genest, Marie-Christine Doran, and Sylvie Paquerot (eds), Human Rights as Battlefields: Changing Practices and Contestations 249–268, 253 (Palgrave, 2019).

23 The State of Palestine’s Palestinian National Voluntary Review on the Implementation of the 2030 Agenda (June 2018) at pp. 90–91, with reference to Goal 9 as well as Goal 17 (emphasis added). Freedom from digital domination is so essential to avert cyber-vulnerability that some scholars have gone so far as to propose that cyber blockades by foreign agents are addressed as crimes against humanity; refer eg to https://doi.org/10.34190/iccws.19.1.1948.

24 Elia Zureik et al., Information Society in Palestine: The Human Capital Dimension, Report Submitted to the International Development Research Centre in Ottawa (File 102130), 27 (2006).

25 Visualizing Impact, Digital Apartheid, in Deborah Cowen, Alexis Kyle Mitchell, Emily K. Paradis, and Brett Story (eds), Digital Lives in the Global City: Contesting Infrastructures 112–113 (University of British Columbia Press, 2020).

26 Tobias Kelly, Law, Violence and Sovereignty Among West Bank Palestinians 89 (Cambridge UP, 2006).

27 Zureik et al., op. cit., 32.

28 Hasan Abu-Libdeh (حسن أبو لبدة‎), Statistical Data on Palestinian Refugees: What We Know and What We Don’t, in Rex J. Brynen and Roula El-Rifai (eds), Palestinian Refugees: Challenges of Repatriation and Development 4–28, 23 (International Development Research Centre, 2007); Sari Hanafi, Social Capital, Transnational Kinship and Refugee Repatriation Process: Some Elements for a Palestinian Sociology of Return, in Rex J. Brynen and Roula El-Rifai (eds), Palestinian Refugees: Challenges of Repatriation and Development 46–78 (International Development Research Centre, 2007).

29 Petros Iosifidis and Mark Wheeler, Public Spheres and Mediated Social Networks in the Western Context and Beyond, 184, 262 (Palgrave, 2016); Raja Khalidi et al., Palestinian Innovation System and Digital Economy: Challenges and Opportunities—Annexes, Paper Prepared for the Swiss Development Cooperation, 3, 9 (Palestine Economic Policy Research Institute, Ma’had Abhath As-Syasat Al-Iqtisadiya Al-Filastini, 2018).

30 Chiara Ayad, Policing the Digital Sphere: The Impact of Palestine’s Cybercrime Legislation, Arab Reform Initiative, 3–4 (2018), https://www.arab-reform.net/wp-content/uploads/pdf/Arab_Reform_Initiative_en_policing-the-digital-sphere-the-impact-of-palestines-cybercrime-legislation_1288.pdf.

31 Benjamin G. Waters, An International Right to Privacy: Israeli Intelligence Collection in the Occupied Palestinian Territories, 50 Georgetown Journal of International Law 573–397, 586–590 (2019).

32 Shane Darcy, To Serve the Enemy: Informers, Collaborators, and the Laws of Armed Conflict, 206 (OUP, 2019). https://ccdcoe.org/uploads/2022/06/The-Rights-to-Privacy-and-Data-Protection-in-Armed-Conflict.pdf (pp 147–148).

33 Cristiano, op. cit., 250–251.

34 Ibid., 252ff.

35 Ibid., 256.

36 Barrie Sander, Freedom of Expression in the Age of Online Platforms: The Promise and Pitfalls of a Human Rights-Based Approach to Content Moderation, 43 Fordham International Law Journal, 939–1006, 970–987 (2020).

37 Ibid., 968–970.

38 Ibid., 1005.

39 Sarah Koslov, Incitement and the Geopolitical Influence of Facebook Content Moderation, 4 Georgetown Law Technology Review 183–214, 189 (2019).

40 Arne Hintz, Outsourcing Surveillance—Privatising Policy: Communications Regulation by Commercial Intermediaries, 2 Birkbeck Law Review 349–367, 350 (2014).

41 Andy Clarno, Neoliberal Apartheid: Palestine/Israel and South Africa after 1994, 161 (University of Chicago Press, 2017).

42 Michael Sfard (מיכאל ספרד‎), The Israeli Occupation of the West Bank and the Crime of Apartheid: Legal Opinion (2020), http://www.hamoked.org/files/2020/1664380_eng.pdf; Human Rights Watch, A Threshold Crossed: Israeli Authorities and the Crimes of Apartheid and Persecution (2021), https://www.hrw.org/sites/default/files/media_2021/04/israel_palestine0421_web_0.pdf; Dugard and Reynolds, op. cit.

43 M. T. Samuel, The Jurisprudence of Elimination: Starvation and Force-Feeding of Palestinians in Israel’s Highest Court, 18 International Journal of Law in Context, 156–174, 161–162, 170 (2022), https://doi.org/10.1525/jps.2013.42.2.26.

44 Oskar Josef Gstrein, Mapping Power and Jurisdiction on the Internet through the Lens of Government-Led Surveillance, 9 Internet Policy Review (2020), https://doi.org/10.14763/2020.3.1497.

45 Niels ten Oever, This Is Not How We Imagined It: Technological Affordances, Economic Drivers, and the Internet Architecture Imaginary, 23 New Media & Society 344–362, 344 (2021).

46 Elia Zureik, Israel’s Colonial Project in Palestine: Brutal Pursuit 190–191, 205 (Routledge, 2016).

47 Ibid., 206.

48 Miriyam Aouragh, Palestine Online: Transnationalism, the Internet and the Construction of Identity 117, 160 (I.B. Tauris, 2011).

49 Omar A. El-Khairy, American Statecraft for a Global Digital Age: Warfare, Diplomacy and Culture in a Segregated World, Unpublished PhD Thesis in Sociology at the London School of Economics and Political Science, 139 (2012).

50 Ibid., 28.

51 Helga Tawil-Souri (لجا طويل-الصوري‎), Digital Occupation: Gaza’s High-Tech Enclosure, 41(2) Journal of Palestine Studies 27–43, 36 (2012).

52 Zureik, op. cit., 206.

53 Craig Jones, The War Lawyers: The United States, Israel, and Juridical Warfare ch 4 (OUP, 2020).

54 Marwa Fatafta, Internet Freedoms in Palestine: Mapping of Digital Rights Violations and Threats (7amleh—Arab Center for Social Media Advancement, 2018), https://www.apc.org/sites/default/files/7amleh_Internet_Freedoms_in_Palestine.pdf.

55 Israel Completely Controls Palestinian ICT Sector, Violates Palestinians’ Digital Rights, People’s Dispatch (2019), https://peoplesdispatch.org/2019/02/03/israel-completely-controls-palestinian-ict-sector-violates-palestinians-digital-rights/.

56 Miriyam Aouragh, Palestine Online Cyber Intifada and the Construction of a Virtual Community 2001–2005, Unpublished PhD Thesis in Cultural Anthropology at Universiteit van Amsterdam (2008); Aouragh, op. cit.

57 Tawil-Souri, op. cit.

58 Helga Tawil-Souri (لجا طويل-الصوري‎) and Aouragh, Miriyam, Intifada 3.0? Cyber Colonialism and Palestinian Resistance, 22 Arab Studies Journal 102–133 (2014).

59 Zureik op. cit., 190.

60 Aristomene Varoudakisa and Carlo Maria Rossotto, Regulatory Reform and Performance in Telecommunications: Unrealized Potential in the MENA Countries, 28 Telecommunications Policy 59–78, 60–69 (2004).

61 Charles D. Freilich et al., Israel and the Cyber Threat: How the Startup Nation Became a Global Cyber Power (Oxford UP, 2023).

62 Lior Tabansky, Cyber Security Challenges: The Israeli Water Sector Example, in Robert M. Clark and Simon Hakim (eds), Cyber-Physical Security: Protecting Critical Infrastructure at the State and Local Level 205–219, 217 (Springer, 2017).

63 Fabio Cristiano, Israel: Cyber Warfare and Security as National Trademarks of International Legitimacy, in Scott N. Romaniuk and Mary Manjikian (eds), Routledge Companion to Global Cyber-Security Strategy (Palgrave, 2020).

64 Privacy International, The Global Surveillance Industry (2016), https://privacyinternational.org/sites/default/files/2017-12/global_surveillance_0.pdf, 23.

65 Ronald J. Deibert and Louis W. Pauly, Mutual Entanglement and Complex Sovereignty in Cyberspace, in Didier Bigo, Engin Isin, and Evelyn S. Ruppert (eds), Data Politics: Worlds, Subjects, Rights 81–99, 83 (Routledge, 2019).

66 Neve Gordon, Israel’s Emergence as a Homeland Security Capital, in Elia Zureik, David Lyon, and Yasmeen Abu-Laban (eds), Surveillance and Control in Israel/Palestine: Population, Territory, and Power 153–170, 166 (Routledge, 2011).

67 Erran Carmel and Edward M. Roche, The Dominant Cybersecurity Industry Clusters: Evolution and Sustainment, 30 Industry and Innovation 361–391 (2023).

68 U.S. Department of Homeland Security, Binational Industrial Research and Development (BIRD) Program (2023), https://www.dhs.gov/science-and-technology/bird-hls.

69 U.S. Department of Commerce, Israel—Country Commercial Guide: Information Communication Technology ICT (2023), https://www.trade.gov/country-commercial-guides/israel-information-communication-technology-ict.

70 Matthew S. Cohen et al., Israel and Cyberspace, 17 International Studies Perspectives 307–321, 316 (2016); Lior Tabansky and Isaac Ben Israel, Cybersecurity in Israel 64–65 (Springer, 2015).

71 Jasper Frei, Israel’s National Cybersecurity and Cyberdefense Posture Policy and Organizations, Center for Security Studies at ETH Zürich (2020), https://css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/Cyber-Reports-2020-09-Israel.pdf, 8.

72 The White House, Fact Sheet: U.S.–Israel Strategic High-Level Dialogue on Technology (2022), https://www.whitehouse.gov/briefing-room/statements-releases/2022/09/30/fact-sheet-u-s-israel-strategic-high-level-dialogue-on-technology.

73 Dmitry (Dima) Adamsky, The Israeli Odyssey toward its National Cyber Security Strategy, 40 The Washington Quarterly 113–127, 113 (2017).

74 Eviatar Matania and Lior Yoffe, Some Things the Giant Could Learn from the Small: Unlearned Cyber Lessons for the US from Israel, 7 Cyber Defense Review 101–110 (2022).

75 Human Rights & Democracy: The 2019 Foreign & Commonwealth Office Report, Presented to Parliament by the Secretary of State for Foreign and Commonwealth Affairs by Command of Her Majesty (2020), ISBN 978-1-5286-2051-2, CCS0320406130_07/20, 27.

76 On this terminology, see further Rainer Ricardo, International Hierarchies Built Upon Gratitude as Political Power, e-International Relations (2019), https://www.e-ir.info/2019/12/19/international-hierarchies-built-upon-gratitude-as-political-power/.

77 Nick Couldry et al., Media and Communications, in International Panel on Social Progress (eds), Rethinking Society for the 21st Century: Report of the International Panel on Social Progress 523–562, 541 (CUP, 2018).

78 Jeffrey A. Larsen and Tasha L. Pravecek, Comparative U.S.–Israeli Homeland Security, The Counterproliferation Papers—Future Warfare Series No. 34 (USAF Counterproliferation Center at Air University in Maxwell Air Force Base, 2006), 67; Clarno, op. cit., 164.

79 Jennifer A. Hileman-Tabios, A Palestinian State, Unpublished MA Dissertation in Political Science at the University of Nevada in Las Vegas, 55 (2009).

80 Clarno, op. cit., 165.

81 Stephen D. N. Graham, Laboratories of War: Surveillance and US–Israeli Collaboration in War and Security, in Elia Zureik, David Lyon, and Yasmeen Abu-Laban (eds), Surveillance and Control in Israel/Palestine: Population, Territory, and Power 133–152, 135 (Routledge, 2011).

82 Ibid., 136.

83 Former—and still most widely known—denomination of Meta Platforms, Inc. Throughout this article, I keep the original denomination of Facebook even when referring not just to the social-network platform but to its running company, too, which is now called Meta Platforms, Inc. The same goes for Twitter, now X.

84 Jennifer Megan Hitchcock, Social Media Rhetoric of the Transnational Palestinian-Led Boycott, Divestment, and Sanctions Movement, 2 Social Media + Society 1–12, 3–4 (2016).

85 Julia Carrie Wong, Revealed: The Facebook Loophole That Lets World Leaders Deceive and Harass Their Citizens, The Guardian (2021), https://www.theguardian.com/technology/2021/apr/12/facebook-loophole-state-backed-manipulation.

86 Burçe Çelik, The Politics of the Digital Technoscape in Turkey: Surveillance and Resistance of Kurds, 49 New Perspectives on Turkey 31–56 (2013).

87 Natalija Gelvanovska, Michel Rogy, and Carlo Maria Rossotto, Broadband Networks in the Middle East and North Africa: Accelerating High-Speed Internet Access 159 (The World Bank, 2014).

88 Michael J. Oghia and Helen Indelicato, Ruling Arab Internet: An Analysis of Internet Ownership Trends of Six Arab Countries, in Aleksandra Wilczura (ed), Global Dilemmas of Security and Development in the Middle East 181–196, 190 (Institute of the Middle and Far East of the Jagiellonian University in Kraków, 2013).

89 Tatevik K. Sargsyan, Data Localization and the Role of Infrastructure for Surveillance, Privacy, and Security, 10 International Journal of Communication 2221–2237, 2223–2225 (2016).

90 Andrew Stevens, Surveillance Policies, Practices and Technologies in Israel and the Occupied Palestinian Territories: Assessing the Security State, Working Papers, IV, The Surveillance Studies Centre at the Department of Sociology at Queen’s University in Kingston, 7 (2011).

91 Hillel Nossek and Yehiel Limor, Fifty Years in a Marriage of Convenience: News Media and Military Censorship In Israel, 6 Communication Law and Policy 1–35 (2010).

92 Dana Regev, IDF Censor Requires Bloggers to Submit Posts for Review, Deutsche Welle (2016), https://www.dw.com/en/idf-censor-requires-bloggers-to-submit-posts-for-review/a-19031041.

93 Ram Sundara Raman, Prerana Shenoy, Katharina Kohls, and Roya Ensaf, Censored Planet: An Internet-Wide, Longitudinal Censorship Observatory (2020), https://dl.acm.org/doi/pdf/10.1145/3372297.3417883, 58, t.1.

94 Nick Rahimi and Bidyut Gupta, A Study of the Landscape of Internet Censorship and Anti-Censorship in Middle East, 69 EPiC Series in Computing 60–68, 63 (2020).

95 William Bill Sweeney et al. (eds), Attacks on the Press in 2010: A Worldwide Survey, NYC: Committee to Protect Journalists (2010), https://archive.crin.org/en/docs/attacks_on_the_press_2010.pdf, 226–227.

96 Riz Khan, Preface, in William Bill Sweeney et al. (eds), Attacks on the Press in 2010: A Worldwide Survey, NYC: Committee to Protect Journalists (2011), https://archive.crin.org/en/docs/attacks_on_the_press_2010.pdf, ii.

97 Linda Tabar and Chandni Desai, Decolonization Is a Global Project: From Palestine to the Americas, 6 Decolonization: Indigeneity, Education & Society i–xix, xi (2017).

98 Tawil-Souri and Aouragh, op. cit., 113.

99 Omar H. Rahman, From Confusion to Clarity: Three Pillars for Revitalizing the Palestinian National Movement, Policy Briefing, Brookings Institution (2019), https://www.brookings.edu/wp-content/uploads/2019/12/From-Confusion-to-Clarity-Web.pdf, 4.

100 Clarno, op. cit., 159.

101 Aouragh, op. cit., 55–57.

102 Alon Peled, Debunking the Internet Myth: Technological Prophecies and Middle East Politics, 7(3) Middle East Quarterly 41–54 (2000), https://www.meforum.org/71/debunking-the-internet-myth.

103 Tawil-Souri, op. cit., 30.

104 Usama R. Halabi, Legal Analysis and Critique of Some Surveillance Methods Used by Israel, in Elia Zureik, David Lyon, and Yasmeen Abu-Laban (eds), Surveillance and Control in Israel/Palestine: Population, Territory, and Power 199–218, 212 (Routledge, 2011).

105 Ronald J. Deibert, John Gorham Palfrey, Rafal Rohozinski, and Jonathan L. Zittrain (eds), Access Denied: The Practice and Policy of Global Internet Filtering 305 (MIT Press, 2008); Clarno, op. cit., 160.

106 Stevens, op. cit.

107 UN Human Rights Council, Twentieth Session, Agenda Item 3, Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression on His Mission to Israel and the Occupied Palestinian Territory, A/HRC/20/17/Add.2, para. 34 (2012), emphasis added.

108 Nadera Shalhoub-Kevorkian, E-Resistance and Technological In/Security in Everyday Life: The Palestinian Case, 52 British Journal of Criminology 55–72, 62–63 (2012).

109 UN Human Rights Council, op. cit., para. 651.

110 Ibid., para. 646.

111 Ibid., para. 648.

112 Cristiano, op. cit., 258–260.

113 Ayad, op. cit., 4, 6.

114 Andrew Iliadis and Federica Russo, Critical Data Studies: An Introduction, 3(2) Big Data & Society 1–7 (2016); Ryan Burns, Craig M. Dalton, and Jim E. Thatcher, Critical Data, Critical Technology in Theory and Practice, 70(1) Professional Geographer 126–128 (2018); Andreas Hepp, Juliane Jarke, and Leif Kramp, New Perspectives in Critical Data Studies: The Ambivalences of Data Power—An Introduction, in Andreas Hepp, Juliane Jarke, and Leif Kramp (eds), New Perspectives in Critical Data Studies: The Ambivalences of Data Power 1–23 (Palgrave, 2022).

115 Bertram Turner and Melanie G. Wiber, Legal Pluralism and Science and Technology Studies: Exploring Sources of the Legal Pluriverse, Science, Technology, & Human Values (2022); Rocco Bellanova, Katja Lindskov Jacobsen, and Linda Monsees, Taking the Trouble: Science, Technology and Security Studies, 8(2) Critical Studies on Security 87–100 (2020).

116 Soumia Bardhan and Richard L. Wood, The Role of Culture and Technology in Civil Society Promotion in the Middle East: A Case Study Approach, 24(1) DOMES: Digest of Middle East Studies 111–138, 116 (2015).

117 Cristiano, op. cit., p.253.

118 ten Oever, op. cit., 195.

119 The submarine telecom mapping executed by https://www.infrapedia.com/app shows two interesting facts: First, no Israel-departing cable looks eastward—they all traverse the Mediterranean and eventually reach the Atlantic—also through ring connections; second, the two cables owned by Egypt Telecom that could reach Gaza are regrettably truncated at the border. Apparently, British–U.S. surveillance of Palestine’s Internet previously occurred through a National Security Agency’s hotspot located in Cyprus [see Nicky Hager and Stefania Maurizi, Cyprus: The Home of British/American Internet Surveillance in the Middle East, L’Espresso (2013), https://espresso.repubblica.it/inchieste/2013/11/04/news/the-history-of-british-intelligence-operations-in-cyprus-1.139978], which is indeed a convenient intermediary location also cable-wise. This is a credible claim not only because of the technicalities involved, but also as, regretably, such espionage operations would be anything but unprecedented. To exemplify,

a GCHQ system code named Tempora provides access to over two hundred international fibre optic cables, intercepted where they come ashore at relay points in Britain and Oman. In 2012, data from up to forty-six cables could be actively processed at once, each providing ten gigabytes of data per second, and plans were in place to grow those figures. Tempora grants GCHQ access to a significant proportion of global internet traffic, automatically analysed and processed into a searchable form. The semantic content of intercepted material is stored for three days, and the metadata—the computer-generated data that enables digital communication to occur—is stored for thirty days. The NSA and other state agencies in the Five-Eyes alliance (comprising the US, UK, Canada, New Zealand, Australia) also conduct this type of upstream data collection at selected sites around the world. Each partner provides access to the data to the others, forming a global network of cable interception points.

Refer to Bernard Keenan, Interception: Law, Media, and Techniques, Unpublished PhD Thesis in Law at the London School of Economics and Political Science (2017).

120 James Ball, Julian Borger, and Glenn Edward Greenwald, Revealed: How US and UK Spy Agencies Defeat Internet Privacy and Security, The Guardian (2013), https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security.

121 Anna Gross et al., How the US Is Pushing China out of the Internet’s Plumbing, Financial Times (2023), https://ig.ft.com/subsea-cables; Justin Sherman, Cyber Defense Across the Ocean Floor: The Geopolitics of Submarine Cable Security, Atlantic Council (2021), https://www.atlanticcouncil.org/wp-content/uploads/2021/09/Cyber-defense-across-the-ocean-floor-The-geopolitics-of-submarine-cable-security.pdf; Justin Sherman, The U.S. Should Get Serious About Submarine Cable Security, Council on Foreign Relations (2021), https://www.cfr.org/blog/us-should-get-serious-about-submarine-cable-security.

122 Dan Jerker B. Svantesson, Data Localisation Trends and Challenges: Considerations for the Review of the Privacy Guidelines, 301 OECD Digital Economy Papers 15, 21 (OECD Publishing, 2020), https://doi.org/10.1787/7fbaed62-en; cf. Jinhe Liu, China’s Data Localization, 13(1) Chinese Journal of Communication 84–103, 98 (2020).

123 Sargsyan, op. cit., 2228–2229; Deibert and Pauly, op. cit., 84.

124 Graham, op. cit., 148–149.

125 Jeanette Hofmann, Multi-Stakeholderism in Internet Governance: Putting a Fiction Into Practice, 1(1) Journal of Cyber Policy 29–49 (2016).

126 David G. Post and Danielle Kehl, Controlling Internet Infrastructure: The IANA Transition and Why It Matters for the Future of the Internet, Part I, Open Technology Institute (2015), https://static.newamerica.org/attachments/2964-controlling-internet-infrastructure/IANA_Paper_No_1_Final.32d31198a3da4e0d859f989306f6d480.pdf, 10–11.

127 Miriyam Aouragh and Paula Chakravartty, Infrastructures of Empire: Towards a Critical Geopolitics of Media and Information Studies, 38(4) Media, Culture & Society 559–575, 566 (2016).

128 Patrick Joseph Birkinshaw, Freedom of Information: The Law, the Practice and the Ideal (4th edn) 470 (CUP, 2010).

129 Riccardo Vecellio Segate, Horizontalizing Insecurity, or Securitizing Privacy? Two Narratives of a Rule-of-Law Misalignment Between a Special Administrative Region and Its State, 10(1) Chinese Journal of Comparative Law 56–89, 65–69 (2022), https://doi.org/10.1093/cjcl/cxac002; Riccardo Vecellio Segate, Fragmenting Cybersecurity Norms Through the Language(s) of Subalternity: India in the East and the Global Community, 32(2) Columbia Journal of Asian Law 78–138, 97–103 (2019), https://doi.org/10.7916/cjal.v32i2.3371; Riccardo Vecellio Segate, Litigating Trade Secrets in China: An Imminent Pivot to Cybersecurity?, 15(8) Journal of Intellectual Property Law & Practice 649–659, 657 (2020), https://doi.org/10.1093/jiplp/jpaa092.

130 Hintz, op. cit., 358.

131 Tawil-Souri, op. cit., 35. Most recently, Hibaq Farah, Israeli Restrictions Leave Palestinians Facing Digital Divide, The Guardian (2023), https://www.theguardian.com/world/2023/oct/30/israeli-restrictions-leave-palestinians-facing-digital-divide.

132 Maura Conway, Terrorism and Internet Governance: Core Issues, 3 Disarmament Forum 23–34, 27 (2007).

133 Suhail Taha, The Cyber Occupation of Palestine; Suppressing Digital Activism and Shrinking the Virtual Sphere, Policy Briefs (Global Campus of Human Rights, 2020), https://repository.gchumanrights.org/handle/20.500.11825/1620, 8.

134 Joseph Saba et al., Evaluation of the European Union’s Cooperation With the Occupied Palestinian Territory and Support to the Palestinian people 2008—2013, Final Report—Volume 2, Contract No. 2012/307554, Version 1 (2014), https://ec.europa.eu/neighbourhood-enlargement/sites/near/files/neighbourhood/pdf/key-documents/palestine/evaluation-cooperation-eu-palestine-1327-annex-201405.pdf, 81–84; Riccardo Vecellio Segate, Hidden Hunger in Peacetime and Wartime: Retailoring the Responsibility to Protect to Food-Power Discourses in Burundi and North Korea, Between International Politics and International Law, 46(1) North Carolina Journal of International Law and Commercial Regulation 181–234, 189–204 (2021).

135 International Bank for Reconstruction and Development, The Telecommunication Sector in the Palestinian Territories: A Missed Opportunity for Economic Development, Note for the Palestinian Ministry of Telecommunications and Information Technology, TA-P150798-TAS-BB, 36 (World Bank Group, 2016); Tawil-Souri, op. cit., 35.

136 UN Human Rights Council, Forty-Sixth Session—Agenda Items 2 and 7, Report of the United Nations High Commissioner for Human Rights: Israeli Settlements in the Occupied Palestinian Territory, Including East Jerusalem, and in the Occupied Syrian Golan, A/HRC/46/65, paras. 3, 7, 29–36, 43–53 (15 February 2021).

137 Zureik et al. 2006, op. cit., 29; Zureik 2016, op. cit., 206.

138 Zureik et al. 2006, op. cit., 36.

139 Zureik 2016, op. cit., 208.

140 UN General Assembly, Report Prepared by the Secretariat of the United Nations Conference on Trade and Development on the Economic Costs of the Israeli Occupation for the Palestinian People: Fiscal Aspects, A/74/272, para. 24 (2 August 2019).

141 Dana Weiss and Ronen Shamir, Corporate Accountability to Human Rights: The Case of the Gaza Strip, 24(1) Harvard Human Rights Journal 155–183, 177–178 (2011).

142 Lina Dencik, Arne Hintz, and Jonathan Cable, Towards Data Justice? The Ambiguity of Anti-Surveillance Resistance in Political Activism, 3(2) Big Data & Society 1–12, 7 (2016).

143 Cristiano, op. cit., 254–255.

144 Zureik, op. cit., 183.

145 John Traxler, Digital Literacy: A Palestinian Refugee Perspective, 26 Research in Learning Technology 1983–2003, 1984–1985 (2018).

146 Ibid., 1987–1991.

147 Dmitry Epstein and Kelly Quinn, Markers of Online Privacy Marginalization: Empirical Examination of Socioeconomic Disparities in Social Media Privacy Attitudes, Literacy, and Behavior, 6(2) Social Media + Society 1–13, 9 (2020).

148 Shalhoub-Kevorkian, op. cit., 66.

149 Aouragh, op. cit., 20.

150 Riccardo Vecellio Segate, The Distributive Surveillant Contract: Reforming Surveillance Capitalism Through Taxation Into a Legal Teleology of Global Economic Justice, Talent Program PhD Thesis in International Law at the Department of Global Legal Studies (Faculty of Law) of the University of Macau (2022), https://library2.um.edu.mo/etheses/991010238079006306_ft.pdf, 15 (n 49).

151 W. Sean McLaughlin, The Use of the Internet for Political Action by Non-State Dissident Actors in the Middle East, First Monday (2003), https://firstmonday.org/ojs/index.php/fm/article/download/1096/1016.

152 Shaker Althiabi, The Emergence of Social Media Networks and Their Impacts on Professional Journalism Practices in Saudi Arabia, Unpublished PhD Thesis in Media Studies at Nottingham Trent University, 149–150 (2017).

153 Vasilis Ververis, Sophia Marguel, and Benjamin Fabian, Cross‐Country Comparison of Internet Censorship: A Literature Review, 12(4) Policy & Internet 450–473, 460 (2020).

154 Interpeace, Palestinian Youth: Challenges and Aspirations—A Study on Youth, Peace and Security Based on UN Resolution 2250 (2017), https://www.interpeace.org/wp-content/uploads/2018/04/2018-IP-case-study-Palestine-v3.pdf, 25.

155 Harel Chorev Halewa, Collectivindualism and Shadow Players: Palestinian Youth, Social Media, and Hamas’s Communications Strategies, 14(1) International Journal of Communication 1–23, 2–3 (2020).

156 Tawil-Souri and Aouragh, op. cit.

157 Tamir Sorek, The Changing Patterns of Disciplining Palestinian National Memory in Israel, in Elia Zureik, David Lyon, and Yasmeen Abu-Laban (eds), Surveillance and Control in Israel/Palestine: Population, Territory, and Power 113–129, 117 (Routledge, 2011); Shalhoub-Kevorkian, op. cit., 58.

158 See Hitchcock, op. cit., 7.

159 Yifat Gutman and Noam Tirosh, Balancing Atrocities and Forced Forgetting: Memory Laws as a Means of Social Control in Israel, Law & Social Inquiry 5 (2012), https://doi.org/10.1017/lsi.2020.35, in-text citations omitted.

160 Halewa, op. cit., 9–10, 14.

161 Alistair Fraser, “Curating Digital Geographies in an Era of Data Colonialism,” 104 Geoforum 193–200 (2019).

162 On group algorithmic discrimination, refer generally to Riccardo Vecellio Segate, Shifting Privacy Rights from the Individual to the Group: A Re-adaptation of Algorithms Regulation to Address the Gestaltian Configuration of Groups, 8 Loyola University Chicago Journal of Regulatory Compliance 55–114, 101–102 (2022), https://www.compliancelawjournal.com/compliancelawjournal/issue_viii/MobilePagedArticle.action?articleId=1793260#articleId1793260.

163 Ruba Salih and Sophie Richter-Devroe, Cultures of Resistance in Palestine and Beyond: On the Politics of Art, Aesthetics, and Affect, 22(1) Arab Studies Journal 8–27, 19 (2014).

164 Khalidi et al., op. cit., 49.

165 For the sake of exemplification, Tang et al. postulated two mutually exclusive conclusions. First, they found that people with more online exposure to movement-related information are more likely to have Internet addiction. The latter is positively related to depression. Then, stronger depression prompts stronger support for radical actions. Immediately after, they stated that online exposure to movement-related information relates positively to support for peaceful protests, but it has no relationship with support for radical actions. Gary Tang et al., Politically Motivated Internet Addiction: Relationships among Online Information Exposure, Internet Addiction, FOMO, Psychological Well-Being, and Radicalism in Massive Political Turbulence, 17(2) International Journal of Environmental Research and Public Health 633, 11 (2020).

166 El-Khairy, op. cit., 154.

167 Ibid., 70.

168 Salih and Richter-Devroe, op. cit., 9.

169 Mark Andrew LeVine, When Art Is the Weapon: Culture and Resistance Confronting Violence in the Post-Uprisings Arab World, 6(4) Religions 1277–1313, 1295–1296 (2015).

170 Halewa, op. cit., 6.

171 Jonathan K. Cook, Google, Apple and Social Media are Helping Israel Commit Politicide, Washington Report on Middle East Affairs 26–29 (2020), https://www.wrmea.org/israel-palestine/google-apple-and-social-media-are-helping-israel-commit-politicide.html.

172 Liv Martin, Clothilde Goujard, and Hailey Fuchs, Israel Floods Social Media to Shape Opinion Around the War, Politico (2023), https://www.politico.eu/article/israel-social-media-opinion-hamas-war.

173 Adam Johnson and Othman Ali, Coverage of Gaza War in the New York Times and Other Major Newspapers Heavily Favored Israel, Analysis Shows, The Intercept (2024), https://theintercept.com/2024/01/09/newspapers-israel-palestine-bias-new-york-times.

174 Association for Progressive Communications, Content Regulation in the Digital Age—Submission to the United Nations Special Rapporteur on the Right to Freedom of Opinion and Expression (2018), https://www.apc.org/sites/default/files/APC_submission_Content_regulation_in_the_digital_age_FINAL.pdf, 15.

175 Koslov, op. cit., 185, internal citations omitted.

176 Glenn Edward Greenwald, Facebook Is Collaborating With the Israeli Government to Determine What Should Be Censored: Those Who Want Silicon Valley Tech Giants to Be Arbiters Of Political Speech Are Playing With Fire, The Intercept (2016), https://theintercept.com/2016/09/12/facebook-is-collaborating-with-the-israeli-government-to-determine-what-should-be-censored.

177 Sander, op. cit., 956.

178 Ibid., 957.

179 Rostam Josef Neuwirth, The Global Regulation of Fake News in the Time of Oxymora: Facts and Fictions about the Covid-19 Pandemic as Coincidences or Predictive Programming?, International Journal for the Semiotics of Law 9 (2021), https://doi.org/10.1007/s11196-021-09840-y.

180 Shalhoub-Kevorkian, op. cit., 56.

181 Sander, op. cit., 958.

182 Walid Al-Saqaf, Breaking Digital Firewalls: Analyzing Internet Censorship and Circumvention in the Arab World, 17 Örebro University Studies in Media and Communication 174–181 (2014), ISBN: 978-91-7529-023-2.

183 Miki Quddus, A Movement Back to Home: How Is the Home Presented in Tamim Al-Barghouti’s in Jerusalem?, 12 SOAS Journal of Postgraduate Research 63–68, 64 (2019).

184 Stevens, op. cit., 14.

185 Bregje van Veelen et al., Intervention: Democratising Infrastructure, 87 Political Geography 102378, 2 (2021).

186 Tawil-Souri and Aouragh, op. cit., 104.

187 Cook, op. cit.

188 Tawil-Souri, op. cit., 29. See also Fabio Cristiano, Deterritorializing Cyber Security and Warfare in Palestine: Hackers, Sovereignty, and the National Cyberspace as Normative, 13(1) Cyber Orient 28–42 (2019).

189 Clarno, op. cit., 163.

190 Graham, op. cit., 139–140.

191 Sari Hanafi, Spacio‐Cide: Colonial Politics, Invisibility and Rezoning in Palestinian Territory, 2(1) Contemporary Arab Affairs 106–121 (2009).

192 Suryapratim Roy, Constitutive Reasons and Consequences of Expressive Norms, 34(2) International Journal for the Semiotics of Law 389–408, 391–392 (2021).

193 Ibid., 396–397.

194 Elia Zureik, Colonialism, Surveillance, and Population Control: Israel/Palestine, in Elia Zureik, David Lyon, and Yasmeen Abu-Laban (eds), Surveillance and Control in Israel/Palestine: Population, Territory, and Power 3–45, 35–36 (Routledge, 2011).

195 International Bank for Reconstruction and Development, op. cit., 6–7.

196 Jennifer Megan Hitchcock, A Rhetorical Frame Analysis of Palestinian-Led Boycott, Divestment, Sanctions (BDS) Movement Discourse, Unpublished PhD Thesis in English at Old Dominion University, 208 (2020).

197 Shalhoub-Kevorkian, op. cit., 65.

198 Gabriel Gabi Siboni, Protecting Critical Assets and Infrastructures from Cyber Attacks, 3(1) Military and Strategic Affairs 93–101, 97–100 (2011).

199 Chris McGreal, Zionist Group Uses US Anti-Terrorism Laws to Sue Palestinian Activists, The Guardian (2023), https://www.theguardian.com/world/2023/jan/20/zionist-group-anti-terrorism-laws-palestinian-activists-jnf-bds.

200 Anjli Raval and Emma Jacobs, Business in a Bind Over Messaging on Israel–Hamas War, Financial Times (2023), https://www.ft.com/content/80bd2644-b810-4d6e-8a9c-d4a08432d9e4.

201 Francesca Musiani et al., Net Neutrality as an Internet Governance Issue: The Globalization of an American-Born Debate, 134 Revue française d’études américaines 47–63 (2012).

202 A.W. Ohlheiser, Why Some Palestinians Believe Social Media Companies Are Suppressing Their Posts, Vox (2023), https://www.vox.com/technology/23933846/shadowbanning-meta-israel-hamas-war-palestine.

203 The Times of Israel, NY Court Drops Suit Against Facebook Over Palestinian Incitement (2017), https://www.timesofisrael.com/ny-court-drops-palestinian-incitment-suit-against-facebook.

204 Taha, op. cit., 9.

205 Sargsyan, op. cit., 9–10.

206 U.S. Department of State, Israel and the Golan Heights: 2018 Human Rights Report (2018), https://www.state.gov/wp-content/uploads/2019/03/ISRAEL-AND-THE-GOLAN-HEIGHTS-2018.pdf, 22.

207 Sander, op. cit., 960–962.

208 International Bank for Reconstruction and Development, op. cit., 44.

209 Rens Van Munster, The War on Terrorism: When the Exception Becomes the Rule, 17 International Journal for the Semiotics of Law 141–153 (2004); Susan Tiefenbrun, Decoding International Law: Semiotics and the Humanities 83–126 (Oxford UP, 2010); Nicole Bögelein et al., Courtroom Ethnography in the Context of Terrorism: A Multi-Level Approach, 21 International Journal of Qualitative Methods (2022).

210 Will Oremus and Naomi Nix, Graphic War Videos Go Viral, Testing Social Media’s Rules: Facebook, YouTube and TikTok Ban Support for Hamas. Telegram Allows It. And X Struggles to Enforce Its Own Policies, The Washington Post (2023), https://www.washingtonpost.com/technology/2023/10/11/tiktok-youtube-israel-hamas-content-moderation.

211 Zach Meyers, Breton’s Megaphone Enforcement Is No Way to Tackle Disinformation, Centre for European Reform (2023), https://www.cer.eu/in-the-press/bretons-megaphone-enforcement-no-way-tackle-disinformation; Adam Satariano and Kate Conger, E.U. Probes Elon Musk’s X Platform Over Violent Israel-Hamas War Content, The New York Times (2023), https://www.nytimes.com/2023/10/12/world/middleeast/x-twitter-elon-musk-eu-israel-hamas.html.

212 In the case of Hamas, the organization is officially recognized by extremely powerful states (technically great and regional powers), including China, Turkey, Egypt, India, Iran, Indonesia, Qatar, Russia, Malaysia, and Saudi Arabia. It is patent that listing Hamas as either a terrorist or a legitimate organization is only moderately subordinated to the organization itself, as it is instead to more general geopolitical fractures along most dossiers. Nevertheless, from the preceding list, Turkey’s position is notable, in that Turkey is a NATO member. Equally noteworthy is the somewhat equidistant stance by Japan, which is a traditional Western ally and yet consistently refused to designate Hamas as a terrorist organization or to unequivocally condemn its actions. In any case, Hamas’s status depends on geopolitics far more than on its terrorist (or resistance) strategies—especially when compared to the performance of other military and paramilitary organizations that are more rarely blacklisted just because they belong to the still-dominant geopolitical block. On Hamas’s allies, accreditations, and international relations, refer to France24, Qatar, Iran, Turkey and Beyond: Hamas’s Network of Allies (2023), https://www.france24.com/en/middle-east/20231014-qatar-iran-turkey-and-beyond-the-galaxy-of-hamas-supporters; Tuvan Gumrukcu, Turkey Gave Hamas Members Passports, Israel Says, Reuters (2020), https://www.reuters.com/article/us-turkey-israel-hamas-idUSKBN25M1XW; Tovah Lazaroff, Erdogan: Hamas Is Not a Terrorist Organization, Jerusalem Post (2011), https://www.jpost.com/Middle-East/Erdogan-Hamas-is-not-a-terrorist-organization; Milàn Czerny and Dan Storyev, Why Russia and Hamas Are Growing Closer, Carnegie Endowment for International Peace (2023), https://carnegieendowment.org/politika/90841; Joshua Mitnick and Rushdi Abu Alouf, Hamas Is Feeling the Pain of Qatar’s Crisis, and Looking to Egypt for Help, Los Angeles Times (2017), https://www.latimes.com/world/middleeast/la-fg-qatar-hamas-egypt-20170619-story.html; Erik Skare, Iran, Hamas, and Islamic Jihad: A Marriage of Convenience, European Council on Foreign Relations (2023), https://ecfr.eu/article/iran-hamas-and-islamic-jihad-a-marriage-of-convenience; Tianshe Chen, Support or Hostility: The Relationship between Arab Countries and Hamas, 4(2) Journal of Middle Eastern and Islamic Studies (in Asia) 100–120 (2010); Aiza Mohamad, The Growing Significance of Malaysia and Indonesia’s Non-Recognition of Israel, The Diplomat (2023), https://thediplomat.com/2023/10/the-growing-significance-of-malaysia-and-indonesias-non-recognition-of-israel; Thomas W. Hill, Hamas and the Springs of Others, 3(98) Confluences Méditerranée 89–101 (2016); Nguyen Quoc Tan Trung, Opinion—Assessing the Legality of Ousting Hamas, e-International Relations (2023), https://www.e-ir.info/2023/11/21/opinion-assessing-the-legality-of-ousting-hamas, 1; Anisah Shukry, Why Malaysia Recognizes Hamas and What It Means for US Ties, Bloomberg (2023), https://www.bloomberg.com/news/articles/2023-11-10/inside-malaysia-s-refusal-to-cut-ties-to-hamas-and-what-it-means-for-israel-us.

213 Alaa Hachem and Oona A. Hathaway, The Promise and Risk of South Africa’s Case Against Israel, Just Security (2024), https://www.justsecurity.org/91000/the-promise-and-risk-of-south-africas-case-against-israel.

214 Matthew Gillett and Wallace Fan, Expert Evidence and Digital Open Source Information: Bringing Online Evidence to the Courtroom, Journal of International Criminal Justice mqad050 (2023), https://doi.org/10.1093/jicj/mqad050; Riccardo Vecellio Segate, Cognitive Bias, Privacy Rights, and Digital Evidence in International Criminal Proceedings: Demystifying the Double-Edged AI Revolution, 21(2) International Criminal Law Review 242–279 (2021); Matthew Gillett, Fact-Finding Without Rules: Habermas’s Communicative Rationality as a Framework for Judicial Assessments of Digital Open-Source Information, 44(3) Michigan Journal of International Law 301–348 (2023); Solon Solomon, One Image, One Thousand Words? Discussing the Outer Limits of Resorting to Visual Digital Evidence in Cases Involving International Crimes, 51(2) Georgia Journal of International and Comparative Law 373–395 (2023); Beth Van Schaack, Leveraging Big Data for LOAC Enforcement: Finding the Needle in a Stack of Needles, in Laura A. Dickinson and Edward W. Berg (eds), Big Data and Armed Conflict: Legal Issues Above and Below the Armed Conflict Threshold 291–317 (Oxford UP, 2024).

215 Hillary Hubley, Bad Speech, Good Evidence: Content Moderation in the Context of Open-Source Investigations, 22(5) International Criminal Law Review 989–1015 (2022).

216 For instance, the European Commission’s Proposal for a Council [of the EU’s] Decision on the Union position within the Joint Committee established by the Euro-Mediterranean Interim Association Agreement on Trade and Co-operation between the European Community, of the one part, and the Palestine Liberation Organisation (PLO) for the benefit of the Palestinian Authority (PA) of the West Bank and the Gaza Strip, of the other part, with regard to the adoption of a Recommendation on the implementation of the EU-PA ENP Action Plan, COM(2012) 748 final, 2012/0346 (NLE), paras. 119–120 (12 December 2012).

217 Manuel Langendorf, Digital Stability: How Technology Can Empower Future Generations in the Middle East, ECFR/317, 28 (European Council on Foreign Relations, 2020).

218 The European Union-Palestinian Authority Action Plan 2013, Priority Objectives: 7, https://ec.europa.eu/neighbourhood-enlargement/sites/near/files/eu-palestine_action_plan_2013.pdf.

219 That is, a sort of Constitution for the State of Palestine, just like those in force in the People’s Republic of China’s two Special Administrative Regions (SARs) of Hong Kong and Macao.

220 European Commission, Commission Implementing Decision of 19.11.2019 on the Annual Action Programme in Favour of Palestine for 2019, C(2019) 8426 final, Annex 3, 8 (2019).

221 Beatrice Gori, From Kinetic to Cyber Attacks and Back: The Israeli Approach to Deterrence in Cyberspace and the Multi-Dimensional Threat of Hamas, Research Paper, Center for Cyber Security and International Relations Studies at the University of Florence, 12–13 (2022).